last executing test programs: 9m21.319705853s ago: executing program 2 (id=1283): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xc2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x11, 0x3, 0x0) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xa0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x2f, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9m17.794371527s ago: executing program 2 (id=1289): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000040), 0x4) r0 = socket$kcm(0x10, 0x7, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xfe33) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0xa, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x513, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x202, 0x0, 0xffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r6, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r7 = socket$kcm(0x10, 0x2, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r4, 0x4) sendmsg$inet(r7, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000140081044e81f782db44b9040a1d080201000000040000a118000200ff020000000000000000000000000001a80016ea1f00084003bc5f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f722f054f55153c6f94007134cf6ee08000a09108e8d8ef075c0100000000000000cb490000001fb791643a5e835913b06218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f52eb4edbb57a5025ccca9e00360d8bcc00400040fad95667e0060000000000000580bb9ad809d5e1cace81b341139fe3cd4032e8edb12da7a83248b009c81572d3a39b", 0xe4}], 0x1, 0x0, 0x0, 0x7400}, 0xc04) sendmsg(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000000080)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}, 0x80}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 9m16.578900746s ago: executing program 2 (id=1293): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) ioctl$SIOCSIFHWADDR(r1, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100ffffffff"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000000000007fcc6c89d2432407000000100000000100"], 0x0, 0x53}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x2160) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x4}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x80000000000, 0xc93}, 0x0, 0x0, 0xffffff08}, 0x0, 0xffffffdfffffffff, r0, 0xd) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000180), 0x4) r4 = socket$kcm(0x1e, 0x5, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={&(0x7f0000000200)='./file0\x00', 0x0, 0x8, r4}, 0x18) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc60100007000c000300053582c137153e37000c0980fc0b10070300", 0x33fe0}], 0x1}, 0x0) sendmsg$sock(r4, &(0x7f00000005c0)={&(0x7f0000000300)=@tipc=@name={0x1e, 0x2, 0x1, {{0x41}}}, 0x80, &(0x7f0000000200)}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x254e00, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x402180, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'virt_wifi0\x00', 0x7c2}) r7 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r7, &(0x7f0000000f00)={&(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000100)='f', 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="20000000000000008400000008"], 0x20}, 0x40000c4) sendmsg$inet(r7, &(0x7f0000000f00)={&(0x7f0000000180)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)='&', 0x1}], 0x1, &(0x7f0000000000)=ANY=[], 0x20}, 0x0) 9m16.387515092s ago: executing program 2 (id=1296): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000040), 0x4) r0 = socket$kcm(0x10, 0x7, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xfe33) r1 = socket$kcm(0x10, 0x2, 0x0) close(0xffffffffffffffff) r2 = socket$kcm(0xa, 0x6, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10d, 0xa, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x513, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x202, 0x0, 0xffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r8 = socket$kcm(0x10, 0x7, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="01000000080000000200000004"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000640)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000080000850000002d00000018110000", @ANYRESHEX=r2, @ANYRESDEC=r6], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0)=r4, 0x4) sendmsg$inet(r8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000140081044e81f782db44b9040a1d080201000000040000a118000200ff020000000000000000000000000001a80016ea1f00084003bc5f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f722f054f55153c6f94007134cf6ee08000a09108e8d8ef075c0100000000000000cb490000001fb791643a5e835913b06218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f52eb4edbb57a5025ccca9e00360d8bcc00400040fad95667e0060000000000000580bb9ad809d5e1cace81b341139fe3cd4032e8edb12da7a83248b009c81572d3a39b", 0xe4}], 0x1, 0x0, 0x0, 0x7400}, 0xc04) sendmsg(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000000080)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x44}}, 0x80}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) 9m15.458729752s ago: executing program 2 (id=1300): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9m14.813467613s ago: executing program 2 (id=1303): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000090401a80016000a0001", 0x37}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x60044084) socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x5865}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402", 0x11}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x28, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0xe, 0x5}, {0x2}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x6e, &(0x7f0000000000)=r5, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1802000001000000000000000000000085"], 0x0, 0x3, 0x7, 0x0, 0x41000, 0x7c, '\x00', 0x0, 0x0, r5}, 0x94) r6 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0xd, &(0x7f0000000000)=r9, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d800000010", 0x5}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x3, @remote}}, 0x80, 0x0}, 0x1) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfe33) socket$kcm(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4b200000, 0x0, 0x0, 0x0, 0x0, 0x0) 8m59.028631184s ago: executing program 32 (id=1303): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000090401a80016000a0001", 0x37}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x60044084) socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x5865}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402", 0x11}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x28, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0xe, 0x5}, {0x2}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x6e, &(0x7f0000000000)=r5, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1802000001000000000000000000000085"], 0x0, 0x3, 0x7, 0x0, 0x41000, 0x7c, '\x00', 0x0, 0x0, r5}, 0x94) r6 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0xd, &(0x7f0000000000)=r9, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d800000010", 0x5}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x3, @remote}}, 0x80, 0x0}, 0x1) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfe33) socket$kcm(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4b200000, 0x0, 0x0, 0x0, 0x0, 0x0) 4m26.780476396s ago: executing program 0 (id=2868): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000011c0)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12a, 0x0, 0x0, 0x0, 0x4e9}, [@ldst={0x3, 0x2, 0x0, 0x8, 0xb, 0x6, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @generic={0x2, 0x0, 0xe, 0x8000, 0xfffff988}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0x1000, &(0x7f00000000c0)=""/4096, 0x41100, 0x2a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x4, 0xe, 0xb, 0xf41}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001100)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000001140)=[{0x0, 0x3, 0xe}, {0x3, 0x2, 0xc, 0xa}, {0x2, 0x2, 0x3, 0xb}, {0x4, 0x2, 0x10, 0xd}], 0x10, 0x3}, 0x94) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001300)={r0, r1}, 0xc) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f00000008c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000880)="80", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="780000000000000084000000080000001c6ade085067f9a75d3520acec35d39ca3cf1158b59f088565344b86e6d4d09a19f1999d10273bdfdf66a85ca6016744ed29e884081732dbd403b2bdb37184d8d8892ccc1df4747a0094c6292a7207df68411bc578bd7ef100000000000000"], 0x78}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0x1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa, &(0x7f00000004c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)="6478427d442ccdab5ac91520530faa2c7340f2d8937abb1be6e8eab1b5e9beb36cf75fc6c2909273da288529ba41034fa5e747d7fb334eb56f18008982b4820bdb5637b8d422080ed937464092ac8d0353c26890a515f5bc7ae10cecaa8582ca98eb126d1cb1e2197c", 0x69}, {&(0x7f00000002c0)="9066e3e4ed0cff48951b8e33190e3a6424bb0f34930ff11e28e5cb90a2206a050527e8b3958fcd7a7d626afab433f37cfb5fe0273a21a1", 0x37}], 0x3, &(0x7f0000000700)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @initdev={0xac, 0x1e, 0x1, 0x0}, @local}}}], 0x70}, 0x8000) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000013c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', r3, r5, 0x5, 0x3, 0x4}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001340), 0x400, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000001380)) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge0\x00', @random="0100"}) socket$kcm(0xa, 0x5, 0x0) 4m26.36461002s ago: executing program 0 (id=2871): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) close(0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000100)="1400000037000b0fed5a806cb07163990cc47e28", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x200000c0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40034, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x100000001, 0x8}, 0x1b, 0x0, 0x3, 0x1, 0x8, 0xfffffffd, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4004004) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) close(0xffffffffffffffff) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r6, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f0000000100)=r7, 0x4) sendmsg$kcm(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000540)='4', 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x5e0}, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x1}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='-pids -dDvices -cpuset -perf_event -devices +blkio +rdma '], 0x39) socket$kcm(0xa, 0x2, 0x88) 4m26.088144639s ago: executing program 0 (id=2874): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08030700000004000000000000000600142603600e120800110000810401040016000a00104005000000036010fab94dcf5c0461c1d67f6f94007134cf6ee0", 0x51}], 0x1, 0x0, 0x0, 0x7400}, 0xf6c230ded9c37508) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x1000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000008) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x18000000000002a0, 0x13, 0x0, &(0x7f00000001c0)="b15dd7cf1c00000400000000000036af1747da", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) 4m25.932665224s ago: executing program 0 (id=2877): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x2, @perf_config_ext={0x1, 0x80000de}, 0x0, 0xc8, 0x0, 0x7, 0x4000000000, 0x2, 0x13, 0x0, 0x20, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 4m25.761334769s ago: executing program 0 (id=2878): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xdf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4222e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0x90) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xa, 0x4, 0x10, 0x3, 0x0, 0xe56, 0x90000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x4, 0x3, 0x7, 0x92, 0xb, 0x2, 0x0, 0x726, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x10006}], 0x10, 0x1ad1}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc601000070003000300053582c137153e37000c", 0x26}], 0x1}, 0x0) 4m25.226081877s ago: executing program 0 (id=2881): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1f, &(0x7f0000000040), 0xcf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pressure(r4, &(0x7f0000000000)={'some', 0x20, 0xfffffffffffffffa}, 0x2f) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x29, 0x1f, &(0x7f0000000040), 0xcf) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) (async) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_pressure(r4, &(0x7f0000000000)={'some', 0x20, 0xfffffffffffffffa}, 0x2f) (async) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 4m9.467334676s ago: executing program 33 (id=2881): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1f, &(0x7f0000000040), 0xcf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pressure(r4, &(0x7f0000000000)={'some', 0x20, 0xfffffffffffffffa}, 0x2f) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x29, 0x1f, &(0x7f0000000040), 0xcf) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) (async) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_pressure(r4, &(0x7f0000000000)={'some', 0x20, 0xfffffffffffffffa}, 0x2f) (async) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 18.095691039s ago: executing program 4 (id=3872): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8}, 0x94) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000340)={0x0, 0xffffffffffffffc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x4000000830e}, 0x10a9c8, 0x3, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x18, 0x7, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x1, @perf_config_ext={0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={0xffffffffffffffff, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000080)="0000090000980500000000", 0x0, 0x7fffffff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x7}]}) socket$kcm(0x2, 0x1, 0x84) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x6, 0x4, 0xa, 0x8001, 0x0, 0x0, 0x0, 0x4713}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r5}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r4}, &(0x7f0000000400), &(0x7f0000000440)=r3}, 0x20) close(r7) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x1, 0xfffffffb, 0xcb9, 0x1102, r4, 0x3, '\x00', r6, 0xffffffffffffffff, 0x4, 0x1}, 0x50) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x4040c04) ioctl$TUNGETVNETLE(r0, 0x40107447, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[], 0x0, 0x26}, 0x28) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x10}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{r8}, &(0x7f00000003c0), &(0x7f0000000400)='%pi6 \x00'}, 0x20) close(r0) 14.350041149s ago: executing program 4 (id=3887): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40000) 14.187504824s ago: executing program 4 (id=3889): bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x2040) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x0, 0x5, 0x5d, 0x0, 0x0, 0x2b, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x2, @perf_bp={0x0, 0x6}, 0x5000, 0x4, 0x0, 0x0, 0x6, 0xa, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0xfffffffffffffff9, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000200)=r0, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0xfffe, &(0x7f00000013c0)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305828, &(0x7f0000000040)=0x20000) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x60044084) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x4}]}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x24000008) 13.135152108s ago: executing program 4 (id=3879): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000540)='4', 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x5e0}, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x1}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='-pids -dDvices -cpuset -perf_event -devices +blkio +rdma '], 0x39) socket$kcm(0xa, 0x2, 0x88) 10.57864388s ago: executing program 1 (id=3881): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @local, 0x101}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xdf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4222e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0x90) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xa, 0x4, 0x10, 0x3, 0x0, 0xe56, 0x90000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x4, 0x3, 0x7, 0x92, 0xb, 0x2, 0x0, 0x726, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x10006}], 0x10, 0x1ad1}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc601000070003000300053582c137153e37000c", 0x26}], 0x1}, 0x0) 10.114236885s ago: executing program 4 (id=3884): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x200000000}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x4}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}}}, 0x80, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8712380000001ffdff0000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x200000000000000) 9.828942405s ago: executing program 5 (id=3886): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000500), 0x4) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfc, r5, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r11 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x890b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) 5.966817598s ago: executing program 6 (id=3888): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff241a918217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7a12c9fcfe4c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca8939000031300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) unlink(&(0x7f00000001c0)='./file0\x00') r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="4e630800dfef7fc70df31c"], 0x8) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000200)={&(0x7f0000000040)="d6c37c5fbfdbc8c2f6d9acaddd7e6a7ac58431a2", 0x0, 0x0, 0x0, 0x8}, 0x38) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000005000800"], 0x48) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRES64=r6, @ANYBLOB="c2a06c86cbcf7b72ca913a4aafd200cc417575c811f5332badd78c22c05d82168792d80b36eb7fa29a85b0139e3123b0b0832da51b885de3f7ffd98f617522c92f24c17feeb2e0487520d4da994043151870da627ab225cb91e586d0c857", @ANYRESHEX], 0xcfa4) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x66) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r9 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r9, 0x84, 0x7b, &(0x7f0000000000)=r11, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r11, 0xfa, &(0x7f00000000c0)}, 0x10) r12 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f0000000640), 0x4) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r13, 0x10) sendmsg$inet(r3, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x25c56, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1, 0x0, 0x0, 0x2000000}, 0x80d1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230041) 5.857716052s ago: executing program 5 (id=3890): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40000) 5.751930275s ago: executing program 4 (id=3891): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="5c00000014006b", 0x7}, {&(0x7f00000017c0)="00000000ffffffff1f01a0c9a1171aa56a8d710000c073e99f8f2ffed6bd642c1238663e9e5189a46cb56c776afa8ec3d4d4d9c0648fc18bad3a6b5656235d60cb5af5c5a69e10ed9fd4ea", 0x4b}, {&(0x7f0000001840)="9a9245a259250adbc6e2", 0xa}], 0x3, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x749}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) r3 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x63) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_pressure(r4, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r3, 0x12) r6 = openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_freezer_state(r6, &(0x7f00000000c0)='FROZEN\x00', 0x7) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000040)={'wlan1\x00', @random="0100"}) 5.751447176s ago: executing program 5 (id=3892): socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x10, 0x400000002, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21ca0000cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c98cda2948ef0f440d7cad29567e15a7d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf225571f2487fc86acc2bff7d5664abebd6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552d703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8498856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa086d2a39f13f60b51136a945f780687aad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f91b52fc0b241c2db99a187c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b152d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a66"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x10, 0x7, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc00800020007000200060001c003", 0x31}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000085100000ffffffff"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x94) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d640a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x2, &(0x7f00000005c0)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9e}], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x154, 0x154, 0x5, [@int={0x10, 0x0, 0x0, 0x1, 0x0, 0x45, 0x0, 0x2a, 0x7}, @const={0x6}, @enum64={0xe, 0x6, 0x0, 0x13, 0x1, 0x10, [{0x6, 0x1, 0x1000}, {0x2, 0x1b6, 0xcc}, {0xb, 0x0, 0x3}, {0x9, 0xf, 0x10000}, {0xe, 0x6, 0x7}, {0x9, 0x0, 0x7f}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x4}}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0xffffff81, [{0xd, 0x2, 0x3}]}, @typedef={0x1, 0x0, 0x0, 0x8, 0x4}, @union={0x8, 0x8, 0x0, 0x5, 0x1, 0x45b3, [{0x10, 0x1, 0x100}, {0x5, 0x3, 0x1}, {0xe, 0x4, 0x6}, {0x5, 0x2, 0x8}, {0xe, 0x0, 0x32}, {0xa, 0x2, 0x9}, {0xf, 0x1, 0x80000001}, {0xd, 0x1, 0x4000}]}, @struct={0x2, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xb, 0x3, 0x5}, {0x10, 0x3, 0x3}, {0xc, 0x3, 0x20}]}, @fwd={0x6}]}, {0x0, [0x0, 0x5f, 0x1e]}}, &(0x7f0000000380)=""/212, 0x171, 0xd4, 0x1, 0x6}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf25, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.746803935s ago: executing program 1 (id=3893): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000500), 0x4) socket$kcm(0x2, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfc, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r3, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r6 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r8 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x890b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) 5.544179562s ago: executing program 3 (id=3894): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x4, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x3, 0x3a) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x454, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0xe08ca72be36d9991, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffffffffe24, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)=r4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000000000000000000094b6fc7c9db118936b000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x1, '\x00', r4, r2, 0x0, 0x3, 0x2}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018200000000000003400000034000000060000000400000000000007000000000000000000000001050000a2200000000000000001000085100000000000000002000000000000ff00000100da"], 0x0, 0x52}, 0x20) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="24000000660091ef"], 0xfe33) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f4001100032b2c25fe8007000000007a2c0800000009000000000000000000000000fffffff50000", 0x5dc}], 0x1}, 0x0) 5.319714579s ago: executing program 6 (id=3895): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @local, 0x101}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xdf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4222e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[], 0x0}, 0x94) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xa, 0x4, 0x10, 0x3, 0x0, 0xe56, 0x90000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x4, 0x3, 0x7, 0x92, 0xb, 0x2, 0x0, 0x726, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x10006}], 0x10, 0x1ad1}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc601000070003000300053582c137153e37000c", 0x26}], 0x1}, 0x0) 5.281885921s ago: executing program 1 (id=3905): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x152, 0x1, 0x0, 0x2, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x1, 0x106) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073017700000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r2, r0, 0x4, r1}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1e, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="8500000056000000040000000800000195"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x15, &(0x7f0000000500), 0x4) 4.937284662s ago: executing program 3 (id=3896): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @local, 0x101}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xdf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4222e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[], 0x0}, 0x94) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xa, 0x4, 0x10, 0x3, 0x0, 0xe56, 0x90000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x4, 0x3, 0x7, 0x92, 0xb, 0x2, 0x0, 0x726, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x10006}], 0x10, 0x1ad1}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc601000070003000300053582c137153e37000c", 0x26}], 0x1}, 0x0) 4.725450638s ago: executing program 5 (id=3897): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x4, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x3, 0x3a) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x454, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0xe08ca72be36d9991, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x1, '\x00', 0x0, r2, 0x0, 0x3, 0x2}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000"], 0x0, 0x52}, 0x28) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, 0x0, 0xfe33) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x33, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f4001100032b2c25fe8007000000007a2c0800000009000000000000000000000000fffffff50000", 0x5dc}], 0x1}, 0x0) 3.993094192s ago: executing program 5 (id=3898): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000540)='4', 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="a0000000000000000b0100000400000043e2c520c578ad0d79b52008ea172c0d7d7cc6241cb8bb9e6be742f80851e7d1a502bedc0c2a4da1c3c0da096ed25e8c3fae526c09700b3a6bcdffb293d1d4ec80642b2cc5cfacf1e37fe7f1d34933bc5a15aa733e1db0e8c1db400fce316af4f3d838302154d2feb15c1f721a6fcaeb3dd3be72af44ea46445d8410618d28c4fac1602ab56d45cb561212d51770000088000000000000009200000040000000459fae71ec32c699873d5edcf9c6c7ca72ae2780f36a9f5f0e6c2fe3d72228efd5744252e240d68ac38dbd8a7652b381ef33a1e0882c6cde710fa3ad2c0f0b77062dfb4d12675b588d5bbdc2fba065cdd2de40c57c6ea7fe5efe1d1cb76650b1646361cccbe83b39d2bb23795e5f1fd8b41f000000000000e0000000000000000c010000a4000000e0a51d83dc5711f91fe63a552b4ea897a4a03ab8435d08374aaa864f710f033f2420d39fcecfd8651207c39f3468a85ba9a1839991df3315b4c03afbba8cc24a7ea61719d0f8858a99f48a639f4955b1e5b5c1e637ee964a37e2379990b272644d7e8e5913c32e677c623cfc86335a2cb34bf3c3815be8e68a6ea98025c632063cd2ebc230fceb149f4e5221aaece73543ee03e420d65fd92dc037169d8e1f554726b21e16d54321dd01156d1bb9f0569155b69f3a62c66959a849aef0b79f91b1cb8fe3aecf5b0ace96000000000000a8000000000000001401000002000000a10b958486bf6b0cbc98ebdc89064c5d44aea5ffe4ab31df2e9d02c2251a76c19738557bcda205a2d8c4542efe31c63b694ba4e0645e600333d8b43f986313dd3fc77a37737bc207af8730fb0681a919b1063dde130f4317dddd5983c70a4e5d4e77ff7928fb27d54ac3ac8a20c967fb469f58e835bcaa5128c7093e11a3c3cfd46f646dcc91fcdb4a70ee5770c1c1ec33d8b2562440500078000000000000000a010000d6fdffff2ef60dd173b4bf57df11c370733e67cd7c42f2b4e12148b1b011087318bdc755ae1c848b9fe0bf6e731058b71f88bbf8a0daa7e088cbf313b9d6f6095d1aa1a5ee63a395e0b4b1b6bc0b23e405b8d87c2ec0ba97eefa23c2d2f96d4511a9d4bb823ebc2786760000100100000000000006000000ff000000c9e8b55eb3a7fcb473dd3719455ff31861c305bf2ab2fa8fb81379792c069130c32c4f1707b0ee64671bf17810bfd56e03b15fe7c0b79e910e2b522ed68f01d77fcaab2896c9d860e9de2e74e4dc710d61339544aa342b6eaf2a19603bb2fab64b4ea922cb63d5e8b484fbfb9330a1e594778491e9e42e269f27e668835307f62829f30892f7aa7a054a3c10fc01ab8fc219fb5b16408b5955ce3cb3420229ce2b7679ce5e60db78a2a2a388f3280778fc7e762c9feec8c9e101f9a357bbdf12bbcde051c574305a47474e6abf9e30396a5953ed1971a112e9ba37c49603e2ebead6f00c67fda9808d7fcdeb434625afe680caf436f5ad952969312649000000b00000000000000019010000070000004208ce68676a1b55239a58080ba5da591bcb492159f7477460341ab35b5180689ac91bd9e3d2d55040207acce0c8d340d1123777fc46a662e657840588000900363219c0d7b495fa0d9317b587b19c1635a498842d58900e513bfe365869c5abec05e880952dddb89d8e10a2d721fc291052ff28dc60f290a5186c2cc42a4df70c6666a21ddbff160fa5b059ee0e14a1c42b0b871a230b45c36d9f737e23000040000000000000000101000007000000ff18ee2204ef27c8d6bf42fb8cbeafd359a0c387b53e43b1989e50656670e9b8bb5c2cbb38c187361d8e000000000000b8"], 0x5e0}, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x1}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='-pids -dDvices -cpuset -perf_event -devices +blkio +rdma '], 0x39) socket$kcm(0xa, 0x2, 0x88) 2.18382883s ago: executing program 3 (id=3899): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000011c0)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12a, 0x0, 0x0, 0x0, 0x4e9}, [@ldst={0x3, 0x2, 0x0, 0x8, 0xb, 0x6, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @generic={0x2, 0x0, 0xe, 0x8000, 0xfffff988}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0x1000, &(0x7f00000000c0)=""/4096, 0x41100, 0x2a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000010c0)={0x4, 0xe, 0xb, 0xf41}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001100)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000001140)=[{0x0, 0x3, 0xe}, {0x3, 0x2, 0xc, 0xa}, {0x2, 0x2, 0x3, 0xb}, {0x4, 0x2, 0x10, 0xd}, {0x4, 0x5, 0x8, 0x9}], 0x10, 0x3}, 0x94) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001300)={r0, r1}, 0xc) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f00000008c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000880)="80", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="780000000000000084000000080000001c6ade085067f9a75d3520acec35d39ca3cf1158b59f088565344b86e6d4d09a19f1999d10273bdfdf66a85ca6016744ed29e884081732dbd403b2bdb37184d8d8892ccc1df4747a0094c6292a7207df68411bc578bd7ef100000000000000"], 0x78}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0x1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)="6478427d442ccdab5ac91520530faa2c7340f2d8937abb1be6e8eab1b5e9beb36cf75fc6c2909273da288529ba41034fa5e747d7fb334eb56f18008982b4820bdb5637b8d422080ed937464092ac8d0353c26890a515f5bc7ae10cecaa8582ca98eb126d1cb1e2197c", 0x69}, {&(0x7f00000002c0)="9066e3e4ed0cff48951b8e33190e3a6424bb0f34930ff11e28e5cb90a2206a050527e8b3958fcd7a7d626afab433f37cfb5fe0273a21a1", 0x37}], 0x3, &(0x7f0000000700)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local}}}], 0x70}, 0x8000) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000013c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', r3, r4, 0x5, 0x3, 0x4}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001340), 0x400, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000001380)) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge0\x00', @random="0100"}) socket$kcm(0xa, 0x5, 0x0) 2.18257195s ago: executing program 6 (id=3900): recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x4}, 0x4040, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa35}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x100000000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)}], 0x2}, 0x8100) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB="0d00ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0, 0x8}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000035000b63d25a80648c2594f90724fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 2.1809932s ago: executing program 6 (id=3901): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000500), 0x4) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfc, r5, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r11 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x890b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) 2.17976974s ago: executing program 3 (id=3902): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x3}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x1e, 0x4, 0x0) socket$kcm(0x1e, 0x4, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8930, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={0x0, 0x0, 0xfffffffffffffe3d}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00037300005b686158bbcfe8875a060300000022000000000000000000000000ac1414aa"], 0xfdef) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_serviced_recursive\x00', 0x26e1, 0x0) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x12, 0xd, 0x4, 0x2}, 0x50) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) 1.842089431s ago: executing program 6 (id=3903): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x200000000}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x4}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) r5 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}}}, 0x80, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000005c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8712380000001ffdff0000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x200000000000000) 1.841718851s ago: executing program 5 (id=3904): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @local, 0x101}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x80, 0x0}, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xdf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4222e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x0}, 0x90) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xa, 0x4, 0x10, 0x3, 0x0, 0xe56, 0x90000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x4, 0x3, 0x7, 0x92, 0xb, 0x2, 0x0, 0x726, 0x0, 0x9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a4fc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b87f7c40a1702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f600e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10f9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80729fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a85430600f1e49db5a5517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a00000000000000000000000047e628cd57cde4268f47c9aaec3a3dfe43e032b88ea53656a8740c1a4e0a99be5c97ba451d8b2b0f4e12ba96082e0f6b2dabe716699090058e61a38ce85611945106dd1309087d3a2cf3aaef6216ff3720c3917170544a509071166565eaa3c9285b5227f520cd47"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ffb2ed6844268cb89e14f0886411e0ff15661aaa50e7369dfbac141416e000004062079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$sock(r3, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x3, 0x10006}], 0x10, 0x1ad1}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc601000070003000300053582c137153e37000c", 0x26}], 0x1}, 0x0) 1.793241573s ago: executing program 1 (id=3906): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000500), 0x4) socket$kcm(0x2, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfc, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r3, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r6 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r8 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x890b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) 1.178697893s ago: executing program 3 (id=3907): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3c, &(0x7f0000000500), 0x4) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfc, r5, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) r11 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x890b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) 557.273153ms ago: executing program 1 (id=3908): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40000) 333.419509ms ago: executing program 1 (id=3909): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x4, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x3, 0x3a) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x454, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0xe08ca72be36d9991, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffffffffe24, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)=r4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000000000000000000094b6fc7c9db118936b000000"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x1, '\x00', r4, r2, 0x0, 0x3, 0x2}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018200000000000003400000034000000060000000400000000000007000000000000000000000001050000a2200000000000000001000085100000000000000002000000000000ff00000100da"], 0x0, 0x52}, 0x20) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="24000000660091ef"], 0xfe33) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f4001100032b2c25fe8007000000007a2c0800000009000000000000000000000000fffffff50000", 0x5dc}], 0x1}, 0x0) 6.28155ms ago: executing program 3 (id=3910): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x8, 0xc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f00000000c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007200000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r3 = socket$kcm(0x1e, 0x5, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x5, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000700)={&(0x7f0000000080)=@tipc=@id={0x1e, 0x3, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x10}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x23, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x200048cc) (async) socket$kcm(0xa, 0x5, 0x0) (async) close(0x3) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000140)="b9ff0300600d69", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = socket$kcm(0x21, 0x2, 0x2) (async) socket$kcm(0x10, 0x2, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x13}, 0x2}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='-freezer +fveezer -cpuacct +hugetlb -perf_event -blkio +freezer +cpuacct -perf_event '], 0x55) (async) sendmsg$kcm(r5, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x38, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x20044010) (async) close(r5) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1, r0}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 6 (id=3911): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f00000009c0)=ANY=[@ANYBLOB="6112bf00000000006113500000000000bf2000000000000007000000080000002d030100000000009500000c000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f77000000000000bf54000000000000070400000400f9ff2d53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925cd3ded25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d60800000000000000c2ea17f04537fc211576846ac629d1d93265ba474580047a9dc88de358ce795731891a2031de4e09740c64e5306f995a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bec62bcb2bc91ddcdfac2e6d442105ee6c0742b5e9584543b72f762d21c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2"], &(0x7f0000000100)='GPL\x00', 0x3}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x3a) r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43}, 0x5}}, 0x80, 0x0, 0x101d0, &(0x7f0000000580)=ANY=[], 0x1458}, 0x240048c0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0xfffffffe, 0x5, 0x6, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100"], 0x0, 0xfffffffffffffe3d}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8934, &(0x7f00000007c0)={'hsr0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x8a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) kernel console output (not intermixed with test programs): 909] should_fail+0x38c/0x4c0 [ 777.882660][T15909] _copy_from_iter+0x40d/0x1170 [ 777.887514][T15909] ? __lock_acquire+0x7d10/0x7d10 [ 777.892634][T15909] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 777.898012][T15909] ? __virt_addr_valid+0x3c6/0x470 [ 777.903135][T15909] ? __phys_addr_symbol+0x2b/0x70 [ 777.908158][T15909] ? __check_object_size+0x30c/0x410 [ 777.913459][T15909] netlink_sendmsg+0x758/0xbe0 [ 777.918229][T15909] ? netlink_getsockopt+0x570/0x570 [ 777.923428][T15909] ? aa_sock_msg_perm+0x94/0x150 [ 777.928548][T15909] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 777.933895][T15909] ? security_socket_sendmsg+0x7c/0xa0 [ 777.939382][T15909] ? netlink_getsockopt+0x570/0x570 [ 777.944666][T15909] ____sys_sendmsg+0x5b7/0x8f0 [ 777.949440][T15909] ? __sys_sendmsg_sock+0x30/0x30 [ 777.954473][T15909] ? import_iovec+0x6f/0xa0 [ 777.958984][T15909] ___sys_sendmsg+0x236/0x2e0 [ 777.963668][T15909] ? __sys_sendmsg+0x2a0/0x2a0 [ 777.968442][T15909] ? trace_event_raw_event_lock+0x270/0x270 [ 777.974338][T15909] ? vfs_write+0x8b2/0xd60 [ 777.978769][T15909] __se_sys_sendmsg+0x1af/0x290 [ 777.983629][T15909] ? __x64_sys_sendmsg+0x80/0x80 [ 777.988565][T15909] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 777.994647][T15909] ? lockdep_hardirqs_on+0x94/0x140 [ 777.999854][T15909] do_syscall_64+0x4c/0xa0 [ 778.004280][T15909] ? clear_bhb_loop+0x30/0x80 [ 778.008963][T15909] ? clear_bhb_loop+0x30/0x80 [ 778.013735][T15909] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 778.019663][T15909] RIP: 0033:0x7f6da65fc819 [ 778.024082][T15909] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 778.043690][T15909] RSP: 002b:00007f6da4856028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 778.052119][T15909] RAX: ffffffffffffffda RBX: 00007f6da6875fa0 RCX: 00007f6da65fc819 [ 778.060093][T15909] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 778.068063][T15909] RBP: 00007f6da4856090 R08: 0000000000000000 R09: 0000000000000000 [ 778.076043][T15909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 778.084132][T15909] R13: 00007f6da6876038 R14: 00007f6da6875fa0 R15: 00007ffd41b2b668 [ 778.092114][T15909] [ 778.229596][ T4210] device hsr_slave_0 left promiscuous mode [ 778.262211][ T4210] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 778.278998][T15921] netlink: 204476 bytes leftover after parsing attributes in process `syz.4.3372'. [ 778.304663][ T4210] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 778.343850][ T4210] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 778.362534][T15921] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 778.372325][ T4210] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 778.385166][ T4210] batman_adv: batadv0: Interface deactivated: vlan1 [ 778.402235][ T4210] batman_adv: batadv0: Removing interface: vlan1 [ 778.465316][ T4210] device veth1_macvtap left promiscuous mode [ 778.471402][ T4210] device veth0_macvtap left promiscuous mode [ 778.622584][ T4210] device veth1_vlan left promiscuous mode [ 779.011463][T15935] netlink: 'syz.4.3377': attribute type 29 has an invalid length. [ 779.583212][ T4210] team0 (unregistering): Port device team_slave_1 removed [ 779.599759][ T4210] team0 (unregistering): Port device team_slave_0 removed [ 779.624290][ T4210] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 779.643414][ T4210] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 779.721188][ T4210] bond0 (unregistering): Released all slaves [ 779.751474][T15935] netlink: 'syz.4.3377': attribute type 29 has an invalid length. [ 781.199141][T15984] netlink: 'syz.3.3393': attribute type 29 has an invalid length. [ 781.208086][T15986] netlink: 'syz.6.3392': attribute type 9 has an invalid length. [ 781.245557][T15984] netlink: 'syz.3.3393': attribute type 29 has an invalid length. [ 781.352298][T15993] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.3395'. [ 781.362463][T15993] openvswitch: netlink: Geneve opt len 5 is not a multiple of 4. [ 781.622485][T16000] netlink: 'syz.5.3398': attribute type 4 has an invalid length. [ 781.650069][T16000] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.3398'. [ 782.151932][T16019] netlink: 156 bytes leftover after parsing attributes in process `syz.5.3405'. [ 783.551956][T16053] FAULT_INJECTION: forcing a failure. [ 783.551956][T16053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 783.634987][T16053] CPU: 1 PID: 16053 Comm: syz.6.3414 Not tainted syzkaller #0 [ 783.642758][T16053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 783.652860][T16053] Call Trace: [ 783.656175][T16053] [ 783.659150][T16053] dump_stack_lvl+0x188/0x250 [ 783.663869][T16053] ? show_regs_print_info+0x20/0x20 [ 783.669114][T16053] ? load_image+0x400/0x400 [ 783.673683][T16053] ? __lock_acquire+0x7d10/0x7d10 [ 783.678748][T16053] ? __alloc_skb+0x473/0x750 [ 783.683388][T16053] should_fail+0x38c/0x4c0 [ 783.687847][T16053] _copy_from_iter+0x22e/0x1170 [ 783.692719][T16053] ? __lock_acquire+0x7d10/0x7d10 [ 783.697772][T16053] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 783.703172][T16053] ? __virt_addr_valid+0x3c6/0x470 [ 783.708383][T16053] ? __phys_addr_symbol+0x2b/0x70 [ 783.713425][T16053] ? __check_object_size+0x30c/0x410 [ 783.718730][T16053] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 783.724487][T16053] ? skb_put+0x117/0x210 [ 783.728797][T16053] tun_get_user+0xaf9/0x3a70 [ 783.733480][T16053] ? tun_ring_recv+0xc40/0xc40 [ 783.738304][T16053] ? rcu_lock_release+0x5/0x20 [ 783.743095][T16053] ? __lock_acquire+0x7d10/0x7d10 [ 783.748173][T16053] tun_chr_write_iter+0x112/0x1e0 [ 783.753223][T16053] vfs_write+0x745/0xd60 [ 783.757497][T16053] ? file_end_write+0x250/0x250 [ 783.762428][T16053] ? __fget_files+0x40f/0x480 [ 783.767571][T16053] ? __fdget_pos+0x1e2/0x370 [ 783.772172][T16053] ? ksys_write+0x71/0x260 [ 783.776615][T16053] ksys_write+0x152/0x260 [ 783.781050][T16053] ? __ia32_sys_read+0x80/0x80 [ 783.785837][T16053] ? lockdep_hardirqs_on+0x94/0x140 [ 783.791058][T16053] do_syscall_64+0x4c/0xa0 [ 783.795594][T16053] ? clear_bhb_loop+0x30/0x80 [ 783.800282][T16053] ? clear_bhb_loop+0x30/0x80 [ 783.805147][T16053] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 783.811052][T16053] RIP: 0033:0x7f51fc6b5819 [ 783.815481][T16053] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 783.835097][T16053] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 783.843622][T16053] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 783.851613][T16053] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 783.859598][T16053] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 783.867579][T16053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 783.875559][T16053] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 783.883572][T16053] [ 784.674302][T16077] netlink: 60 bytes leftover after parsing attributes in process `syz.5.3422'. [ 784.851506][T16077] netlink: 60 bytes leftover after parsing attributes in process `syz.5.3422'. [ 784.904218][T16074] netlink: 209844 bytes leftover after parsing attributes in process `syz.1.3420'. [ 784.992726][T16083] netlink: 'syz.1.3420': attribute type 2 has an invalid length. [ 785.054834][T16083] netlink: 119 bytes leftover after parsing attributes in process `syz.1.3420'. [ 785.144946][T14837] Bluetooth: hci1: command 0x0406 tx timeout [ 785.656914][T16097] netlink: 203516 bytes leftover after parsing attributes in process `syz.5.3429'. [ 785.690194][T16097] netlink: get zone limit has 8 unknown bytes [ 787.181577][T16140] FAULT_INJECTION: forcing a failure. [ 787.181577][T16140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 787.191215][T16123] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 787.230603][T16140] CPU: 0 PID: 16140 Comm: syz.3.3439 Not tainted syzkaller #0 [ 787.238222][T16140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 787.248316][T16140] Call Trace: [ 787.251631][T16140] [ 787.254581][T16140] dump_stack_lvl+0x188/0x250 [ 787.259602][T16140] ? show_regs_print_info+0x20/0x20 [ 787.264915][T16140] ? load_image+0x400/0x400 [ 787.269425][T16140] ? __lock_acquire+0x7d10/0x7d10 [ 787.274462][T16140] should_fail+0x38c/0x4c0 [ 787.278889][T16140] _copy_from_user+0x2e/0x170 [ 787.283574][T16140] bpf_prog_test_run_flow_dissector+0x2c4/0x630 [ 787.289823][T16140] ? __lock_acquire+0x7d10/0x7d10 [ 787.294952][T16140] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 787.300679][T16140] ? __fget_files+0x40f/0x480 [ 787.305368][T16140] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 787.310919][T16140] bpf_prog_test_run+0x31e/0x390 [ 787.316018][T16140] __sys_bpf+0x5a5/0x6f0 [ 787.320284][T16140] ? bpf_link_show_fdinfo+0x380/0x380 [ 787.325675][T16140] ? vtime_user_exit+0x2c8/0x3e0 [ 787.330626][T16140] __x64_sys_bpf+0x78/0x90 [ 787.335048][T16140] do_syscall_64+0x4c/0xa0 [ 787.339467][T16140] ? clear_bhb_loop+0x30/0x80 [ 787.344144][T16140] ? clear_bhb_loop+0x30/0x80 [ 787.348824][T16140] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 787.354724][T16140] RIP: 0033:0x7f0db7128819 [ 787.359187][T16140] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 787.378909][T16140] RSP: 002b:00007f0db5382028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 787.387345][T16140] RAX: ffffffffffffffda RBX: 00007f0db73a1fa0 RCX: 00007f0db7128819 [ 787.395320][T16140] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 787.403300][T16140] RBP: 00007f0db5382090 R08: 0000000000000000 R09: 0000000000000000 [ 787.411282][T16140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 787.419353][T16140] R13: 00007f0db73a2038 R14: 00007f0db73a1fa0 R15: 00007ffce55c5048 [ 787.427353][T16140] [ 787.662663][T16144] FAULT_INJECTION: forcing a failure. [ 787.662663][T16144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 787.753253][T16144] CPU: 1 PID: 16144 Comm: syz.5.3441 Not tainted syzkaller #0 [ 787.760787][T16144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 787.770972][T16144] Call Trace: [ 787.774265][T16144] [ 787.777208][T16144] dump_stack_lvl+0x188/0x250 [ 787.781903][T16144] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 787.788166][T16144] ? show_regs_print_info+0x20/0x20 [ 787.793375][T16144] ? load_image+0x400/0x400 [ 787.797901][T16144] should_fail+0x38c/0x4c0 [ 787.802343][T16144] _copy_from_user+0x2e/0x170 [ 787.807041][T16144] __sys_bpf+0x26d/0x6f0 [ 787.811298][T16144] ? bpf_link_show_fdinfo+0x380/0x380 [ 787.816707][T16144] ? vtime_user_exit+0x2c8/0x3e0 [ 787.821664][T16144] __x64_sys_bpf+0x78/0x90 [ 787.826089][T16144] do_syscall_64+0x4c/0xa0 [ 787.830510][T16144] ? clear_bhb_loop+0x30/0x80 [ 787.835200][T16144] ? clear_bhb_loop+0x30/0x80 [ 787.839887][T16144] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 787.845805][T16144] RIP: 0033:0x7f6da65fc819 [ 787.850232][T16144] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 787.869955][T16144] RSP: 002b:00007f6da4856028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 787.878379][T16144] RAX: ffffffffffffffda RBX: 00007f6da6875fa0 RCX: 00007f6da65fc819 [ 787.886531][T16144] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 787.894512][T16144] RBP: 00007f6da4856090 R08: 0000000000000000 R09: 0000000000000000 [ 787.902487][T16144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 787.910475][T16144] R13: 00007f6da6876038 R14: 00007f6da6875fa0 R15: 00007ffd41b2b668 [ 787.918476][T16144] [ 788.551373][T16159] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3446'. [ 788.579974][T16159] netlink: 201392 bytes leftover after parsing attributes in process `syz.1.3446'. [ 793.311210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.323749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.336130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.348613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.360989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.373631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.386002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.398491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.410955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.423410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 793.910422][T16194] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.3455'. [ 794.908243][T16223] FAULT_INJECTION: forcing a failure. [ 794.908243][T16223] name failslab, interval 1, probability 0, space 0, times 0 [ 794.967672][T16223] CPU: 0 PID: 16223 Comm: syz.3.3464 Not tainted syzkaller #0 [ 794.975293][T16223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 794.985380][T16223] Call Trace: [ 794.988691][T16223] [ 794.991658][T16223] dump_stack_lvl+0x188/0x250 [ 794.996595][T16223] ? show_regs_print_info+0x20/0x20 [ 795.002095][T16223] ? load_image+0x400/0x400 [ 795.006639][T16223] ? __might_sleep+0xf0/0xf0 [ 795.011260][T16223] ? __lock_acquire+0x7d10/0x7d10 [ 795.016378][T16223] ? mark_lock+0x94/0x320 [ 795.020731][T16223] should_fail+0x38c/0x4c0 [ 795.025173][T16223] should_failslab+0x5/0x20 [ 795.029704][T16223] slab_pre_alloc_hook+0x51/0xc0 [ 795.034671][T16223] __kmalloc+0x6b/0x330 [ 795.038846][T16223] ? tomoyo_realpath_from_path+0x118/0x610 [ 795.044675][T16223] tomoyo_realpath_from_path+0x118/0x610 [ 795.050342][T16223] tomoyo_path_number_perm+0x242/0x660 [ 795.055827][T16223] ? verify_lock_unused+0x140/0x140 [ 795.061050][T16223] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 795.066522][T16223] ? ksys_write+0x1c6/0x260 [ 795.071074][T16223] security_file_ioctl+0x6c/0xa0 [ 795.076026][T16223] __se_sys_ioctl+0x48/0x170 [ 795.080623][T16223] do_syscall_64+0x4c/0xa0 [ 795.085046][T16223] ? clear_bhb_loop+0x30/0x80 [ 795.089724][T16223] ? clear_bhb_loop+0x30/0x80 [ 795.094408][T16223] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 795.100309][T16223] RIP: 0033:0x7f0db7128819 [ 795.104731][T16223] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 795.124333][T16223] RSP: 002b:00007f0db5382028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 795.132751][T16223] RAX: ffffffffffffffda RBX: 00007f0db73a1fa0 RCX: 00007f0db7128819 [ 795.140731][T16223] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000004 [ 795.148712][T16223] RBP: 00007f0db5382090 R08: 0000000000000000 R09: 0000000000000000 [ 795.156686][T16223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.164659][T16223] R13: 00007f0db73a2038 R14: 00007f0db73a1fa0 R15: 00007ffce55c5048 [ 795.172762][T16223] [ 795.418346][T16223] ERROR: Out of memory at tomoyo_realpath_from_path. [ 795.843569][T16239] netlink: 203516 bytes leftover after parsing attributes in process `syz.1.3470'. [ 795.879382][T16242] netlink: 'syz.4.3471': attribute type 3 has an invalid length. [ 795.890098][T16242] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.3471'. [ 796.066397][T16248] netlink: 152 bytes leftover after parsing attributes in process `syz.5.3472'. [ 796.136926][T16248] bond0: (slave bond_slave_0): Releasing backup interface [ 796.733793][T16270] netlink: 'syz.3.3479': attribute type 16 has an invalid length. [ 796.751422][T16270] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3479'. [ 797.084610][T16277] netlink: 'syz.1.3482': attribute type 3 has an invalid length. [ 797.113298][T16277] netlink: 'syz.1.3482': attribute type 4 has an invalid length. [ 797.177613][T16277] netlink: 9067 bytes leftover after parsing attributes in process `syz.1.3482'. [ 797.223337][T16287] netlink: 6 bytes leftover after parsing attributes in process `syz.6.3485'. [ 797.252683][T16287] FAULT_INJECTION: forcing a failure. [ 797.252683][T16287] name failslab, interval 1, probability 0, space 0, times 0 [ 797.298641][T16287] CPU: 1 PID: 16287 Comm: syz.6.3485 Not tainted syzkaller #0 [ 797.306167][T16287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 797.316250][T16287] Call Trace: [ 797.319574][T16287] [ 797.322530][T16287] dump_stack_lvl+0x188/0x250 [ 797.327238][T16287] ? show_regs_print_info+0x20/0x20 [ 797.332469][T16287] ? load_image+0x400/0x400 [ 797.335255][T16284] netlink: 'syz.5.3484': attribute type 1 has an invalid length. [ 797.337095][T16287] ? __might_sleep+0xf0/0xf0 [ 797.337125][T16287] ? __lock_acquire+0x7d10/0x7d10 [ 797.337162][T16287] should_fail+0x38c/0x4c0 [ 797.337195][T16287] should_failslab+0x5/0x20 [ 797.337215][T16287] slab_pre_alloc_hook+0x51/0xc0 [ 797.337240][T16287] kmem_cache_alloc_node+0x47/0x2d0 [ 797.337259][T16287] ? __alloc_skb+0xf4/0x750 [ 797.337289][T16287] __alloc_skb+0xf4/0x750 [ 797.383112][T16287] netlink_ack+0x372/0xb50 [ 797.387552][T16287] ? ovs_dp_cmd_fill_info+0x930/0x930 [ 797.392930][T16287] ? netlink_dump+0xcf0/0xcf0 [ 797.397621][T16287] netlink_rcv_skb+0x27a/0x440 [ 797.402390][T16287] ? genl_bind+0x380/0x380 [ 797.406813][T16287] ? netlink_ack+0xb50/0xb50 [ 797.411410][T16287] ? __lock_acquire+0x7d10/0x7d10 [ 797.416447][T16287] ? down_read+0x1aa/0x2e0 [ 797.420874][T16287] genl_rcv+0x24/0x40 [ 797.424865][T16287] netlink_unicast+0x774/0x920 [ 797.429646][T16287] netlink_sendmsg+0x8ba/0xbe0 [ 797.434430][T16287] ? netlink_getsockopt+0x570/0x570 [ 797.439639][T16287] ? aa_sock_msg_perm+0x94/0x150 [ 797.444582][T16287] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 797.449955][T16287] ? security_socket_sendmsg+0x7c/0xa0 [ 797.455417][T16287] ? netlink_getsockopt+0x570/0x570 [ 797.460620][T16287] ____sys_sendmsg+0x5b7/0x8f0 [ 797.465535][T16287] ? __sys_sendmsg_sock+0x30/0x30 [ 797.470665][T16287] ? import_iovec+0x6f/0xa0 [ 797.475180][T16287] ___sys_sendmsg+0x236/0x2e0 [ 797.479881][T16287] ? __sys_sendmsg+0x2a0/0x2a0 [ 797.484660][T16287] ? trace_event_raw_event_lock+0x270/0x270 [ 797.490567][T16287] ? vfs_write+0x8b2/0xd60 [ 797.495034][T16287] __se_sys_sendmsg+0x1af/0x290 [ 797.499894][T16287] ? __x64_sys_sendmsg+0x80/0x80 [ 797.504835][T16287] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 797.510833][T16287] ? lockdep_hardirqs_on+0x94/0x140 [ 797.516047][T16287] do_syscall_64+0x4c/0xa0 [ 797.520467][T16287] ? clear_bhb_loop+0x30/0x80 [ 797.525155][T16287] ? clear_bhb_loop+0x30/0x80 [ 797.529837][T16287] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 797.535732][T16287] RIP: 0033:0x7f51fc6b5819 [ 797.540211][T16287] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 797.559907][T16287] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 797.568325][T16287] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 797.576300][T16287] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 797.584272][T16287] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 797.592244][T16287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 797.600342][T16287] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 797.608508][T16287] [ 797.671167][T16291] netlink: 6 bytes leftover after parsing attributes in process `syz.5.3484'. [ 797.684303][T16284] netlink: 193500 bytes leftover after parsing attributes in process `syz.5.3484'. [ 798.096865][T16303] netlink: 6 bytes leftover after parsing attributes in process `syz.4.3490'. [ 798.314608][ C1] net_ratelimit: 5757 callbacks suppressed [ 798.314629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.333130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.345591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.357937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.370231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.382538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.394857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.407135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.420383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.432728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 798.693053][T16314] netlink: 'syz.4.3493': attribute type 39 has an invalid length. [ 799.362130][T16320] netlink: 'syz.5.3495': attribute type 39 has an invalid length. [ 799.703285][T16332] FAULT_INJECTION: forcing a failure. [ 799.703285][T16332] name failslab, interval 1, probability 0, space 0, times 0 [ 799.743539][T16332] CPU: 1 PID: 16332 Comm: syz.6.3499 Not tainted syzkaller #0 [ 799.751068][T16332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 799.761267][T16332] Call Trace: [ 799.764571][T16332] [ 799.767521][T16332] dump_stack_lvl+0x188/0x250 [ 799.772215][T16332] ? show_regs_print_info+0x20/0x20 [ 799.777428][T16332] ? load_image+0x400/0x400 [ 799.781944][T16332] ? __might_sleep+0xf0/0xf0 [ 799.786632][T16332] ? __lock_acquire+0x7d10/0x7d10 [ 799.791703][T16332] ? netlink_insert+0xe95/0x11f0 [ 799.796657][T16332] should_fail+0x38c/0x4c0 [ 799.801085][T16332] should_failslab+0x5/0x20 [ 799.805605][T16332] slab_pre_alloc_hook+0x51/0xc0 [ 799.810722][T16332] kmem_cache_alloc_node+0x47/0x2d0 [ 799.815921][T16332] ? __alloc_skb+0xf4/0x750 [ 799.820438][T16332] __alloc_skb+0xf4/0x750 [ 799.824785][T16332] netlink_sendmsg+0x654/0xbe0 [ 799.829559][T16332] ? netlink_getsockopt+0x570/0x570 [ 799.834761][T16332] ? aa_sock_msg_perm+0x94/0x150 [ 799.839709][T16332] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 799.845001][T16332] ? security_socket_sendmsg+0x7c/0xa0 [ 799.850465][T16332] ? netlink_getsockopt+0x570/0x570 [ 799.855755][T16332] ____sys_sendmsg+0x5b7/0x8f0 [ 799.860545][T16332] ? __sys_sendmsg_sock+0x30/0x30 [ 799.865579][T16332] ? import_iovec+0x6f/0xa0 [ 799.870090][T16332] ___sys_sendmsg+0x236/0x2e0 [ 799.874780][T16332] ? __sys_sendmsg+0x2a0/0x2a0 [ 799.879559][T16332] ? trace_event_raw_event_lock+0x270/0x270 [ 799.885453][T16332] ? vfs_write+0x8b2/0xd60 [ 799.889897][T16332] __se_sys_sendmsg+0x1af/0x290 [ 799.894755][T16332] ? __x64_sys_sendmsg+0x80/0x80 [ 799.899699][T16332] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 799.905696][T16332] ? lockdep_hardirqs_on+0x94/0x140 [ 799.910905][T16332] do_syscall_64+0x4c/0xa0 [ 799.915322][T16332] ? clear_bhb_loop+0x30/0x80 [ 799.920089][T16332] ? clear_bhb_loop+0x30/0x80 [ 799.924769][T16332] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 799.930668][T16332] RIP: 0033:0x7f51fc6b5819 [ 799.935300][T16332] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 799.954999][T16332] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 799.963420][T16332] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 799.971397][T16332] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000007 [ 799.979457][T16332] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 799.987430][T16332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 799.995486][T16332] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 800.003565][T16332] [ 800.946815][T16338] netlink: 'syz.5.3501': attribute type 1 has an invalid length. [ 801.035795][T16338] netlink: 176 bytes leftover after parsing attributes in process `syz.5.3501'. [ 803.324907][ C1] net_ratelimit: 8992 callbacks suppressed [ 803.324929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 803.327718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.331135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.331402][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.331726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 803.331948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 803.365390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.368715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.368993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 803.369348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 803.971378][T16375] netlink: 'syz.1.3510': attribute type 46 has an invalid length. [ 804.215754][T16386] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3513'. [ 804.457295][T16393] FAULT_INJECTION: forcing a failure. [ 804.457295][T16393] name failslab, interval 1, probability 0, space 0, times 0 [ 804.501144][T16390] netlink: 55631 bytes leftover after parsing attributes in process `syz.5.3518'. [ 804.519585][T16393] CPU: 1 PID: 16393 Comm: syz.4.3517 Not tainted syzkaller #0 [ 804.527127][T16393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 804.537219][T16393] Call Trace: [ 804.540521][T16393] [ 804.543481][T16393] dump_stack_lvl+0x188/0x250 [ 804.548205][T16393] ? show_regs_print_info+0x20/0x20 [ 804.553435][T16393] ? load_image+0x400/0x400 [ 804.557974][T16393] ? __might_sleep+0xf0/0xf0 [ 804.562592][T16393] ? __lock_acquire+0x7d10/0x7d10 [ 804.567659][T16393] should_fail+0x38c/0x4c0 [ 804.572121][T16393] should_failslab+0x5/0x20 [ 804.576640][T16393] slab_pre_alloc_hook+0x51/0xc0 [ 804.581609][T16393] __kmalloc_node_track_caller+0x68/0x3a0 [ 804.587345][T16393] ? netlink_sendmsg+0x654/0xbe0 [ 804.592303][T16393] ? kmem_cache_alloc_node+0x162/0x2d0 [ 804.597781][T16393] ? __alloc_skb+0xf4/0x750 [ 804.602325][T16393] ? netlink_sendmsg+0x654/0xbe0 [ 804.607297][T16393] __alloc_skb+0x22c/0x750 [ 804.611762][T16393] netlink_sendmsg+0x654/0xbe0 [ 804.616591][T16393] ? netlink_getsockopt+0x570/0x570 [ 804.621827][T16393] ? aa_sock_msg_perm+0x94/0x150 [ 804.626799][T16393] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 804.632104][T16393] ? security_socket_sendmsg+0x7c/0xa0 [ 804.637600][T16393] ? netlink_getsockopt+0x570/0x570 [ 804.642821][T16393] ____sys_sendmsg+0x5b7/0x8f0 [ 804.647651][T16393] ? __sys_sendmsg_sock+0x30/0x30 [ 804.652744][T16393] ? import_iovec+0x6f/0xa0 [ 804.657291][T16393] ___sys_sendmsg+0x236/0x2e0 [ 804.662030][T16393] ? __sys_sendmsg+0x2a0/0x2a0 [ 804.666868][T16393] ? trace_event_raw_event_lock+0x270/0x270 [ 804.672959][T16393] ? vfs_write+0x8b2/0xd60 [ 804.677505][T16393] __se_sys_sendmsg+0x1af/0x290 [ 804.682410][T16393] ? __x64_sys_sendmsg+0x80/0x80 [ 804.687368][T16393] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 804.693425][T16393] ? lockdep_hardirqs_on+0x94/0x140 [ 804.698665][T16393] do_syscall_64+0x4c/0xa0 [ 804.703158][T16393] ? clear_bhb_loop+0x30/0x80 [ 804.707853][T16393] ? clear_bhb_loop+0x30/0x80 [ 804.712564][T16393] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 804.718563][T16393] RIP: 0033:0x7f9b1c403819 [ 804.723006][T16393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 804.742632][T16393] RSP: 002b:00007f9b1a65d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 804.751074][T16393] RAX: ffffffffffffffda RBX: 00007f9b1c67cfa0 RCX: 00007f9b1c403819 [ 804.759066][T16393] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 804.767057][T16393] RBP: 00007f9b1a65d090 R08: 0000000000000000 R09: 0000000000000000 [ 804.775049][T16393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 804.783035][T16393] R13: 00007f9b1c67d038 R14: 00007f9b1c67cfa0 R15: 00007ffe5cde8518 [ 804.791086][T16393] [ 805.429481][T16404] netlink: 'syz.4.3522': attribute type 6 has an invalid length. [ 805.650279][ T4227] Bluetooth: hci3: command 0x0406 tx timeout [ 805.670324][ T4227] Bluetooth: hci2: command 0x0406 tx timeout [ 805.990222][T16417] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3526'. [ 808.334729][ C0] net_ratelimit: 11250 callbacks suppressed [ 808.334751][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.337741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.341004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.352877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.365454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.377022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 808.388882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.400698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 808.413245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.424786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 808.729885][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.736265][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.233385][T16447] FAULT_INJECTION: forcing a failure. [ 809.233385][T16447] name failslab, interval 1, probability 0, space 0, times 0 [ 809.251282][T16448] netlink: 'syz.6.3535': attribute type 7 has an invalid length. [ 809.282376][T16448] netlink: 'syz.6.3535': attribute type 1 has an invalid length. [ 809.299579][T16448] netlink: 209836 bytes leftover after parsing attributes in process `syz.6.3535'. [ 809.334917][T16451] FAULT_INJECTION: forcing a failure. [ 809.334917][T16451] name failslab, interval 1, probability 0, space 0, times 0 [ 809.348967][T16447] CPU: 0 PID: 16447 Comm: syz.1.3533 Not tainted syzkaller #0 [ 809.356467][T16447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 809.366555][T16447] Call Trace: [ 809.369862][T16447] [ 809.372902][T16447] dump_stack_lvl+0x188/0x250 [ 809.377615][T16447] ? show_regs_print_info+0x20/0x20 [ 809.382855][T16447] ? load_image+0x400/0x400 [ 809.387384][T16447] ? __might_sleep+0xf0/0xf0 [ 809.392003][T16447] ? __lock_acquire+0x7d10/0x7d10 [ 809.397081][T16447] should_fail+0x38c/0x4c0 [ 809.401536][T16447] should_failslab+0x5/0x20 [ 809.406065][T16447] slab_pre_alloc_hook+0x51/0xc0 [ 809.411031][T16447] __kmalloc_node_track_caller+0x68/0x3a0 [ 809.416776][T16447] ? netlink_sendmsg+0x654/0xbe0 [ 809.421864][T16447] ? kmem_cache_alloc_node+0x162/0x2d0 [ 809.427345][T16447] ? __alloc_skb+0xf4/0x750 [ 809.431885][T16447] ? netlink_sendmsg+0x654/0xbe0 [ 809.436864][T16447] __alloc_skb+0x22c/0x750 [ 809.441317][T16447] netlink_sendmsg+0x654/0xbe0 [ 809.446119][T16447] ? netlink_getsockopt+0x570/0x570 [ 809.451342][T16447] ? aa_sock_msg_perm+0x94/0x150 [ 809.456306][T16447] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 809.461613][T16447] ? security_socket_sendmsg+0x7c/0xa0 [ 809.467158][T16447] ? netlink_getsockopt+0x570/0x570 [ 809.472374][T16447] ____sys_sendmsg+0x5b7/0x8f0 [ 809.477170][T16447] ? __sys_sendmsg_sock+0x30/0x30 [ 809.482313][T16447] ? import_iovec+0x6f/0xa0 [ 809.486940][T16447] ___sys_sendmsg+0x236/0x2e0 [ 809.491658][T16447] ? __sys_sendmsg+0x2a0/0x2a0 [ 809.496461][T16447] ? trace_event_raw_event_lock+0x270/0x270 [ 809.502389][T16447] ? vfs_write+0x8b2/0xd60 [ 809.506939][T16447] __se_sys_sendmsg+0x1af/0x290 [ 809.511986][T16447] ? __x64_sys_sendmsg+0x80/0x80 [ 809.516955][T16447] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 809.522972][T16447] ? lockdep_hardirqs_on+0x94/0x140 [ 809.528200][T16447] do_syscall_64+0x4c/0xa0 [ 809.532637][T16447] ? clear_bhb_loop+0x30/0x80 [ 809.537335][T16447] ? clear_bhb_loop+0x30/0x80 [ 809.542043][T16447] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 809.547965][T16447] RIP: 0033:0x7f97b0404819 [ 809.552408][T16447] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 809.572052][T16447] RSP: 002b:00007f97ae63d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 809.580499][T16447] RAX: ffffffffffffffda RBX: 00007f97b067e090 RCX: 00007f97b0404819 [ 809.588494][T16447] RDX: 0000000000000c04 RSI: 0000200000000080 RDI: 0000000000000003 [ 809.596493][T16447] RBP: 00007f97ae63d090 R08: 0000000000000000 R09: 0000000000000000 [ 809.604488][T16447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.612485][T16447] R13: 00007f97b067e128 R14: 00007f97b067e090 R15: 00007ffe7f438cd8 [ 809.620585][T16447] [ 809.634820][T16451] CPU: 0 PID: 16451 Comm: syz.3.3536 Not tainted syzkaller #0 [ 809.642330][T16451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 809.652418][T16451] Call Trace: [ 809.655725][T16451] [ 809.658678][T16451] dump_stack_lvl+0x188/0x250 [ 809.663411][T16451] ? show_regs_print_info+0x20/0x20 [ 809.668643][T16451] ? load_image+0x400/0x400 [ 809.673256][T16451] ? __might_sleep+0xf0/0xf0 [ 809.677871][T16451] ? __lock_acquire+0x7d10/0x7d10 [ 809.682928][T16451] should_fail+0x38c/0x4c0 [ 809.687407][T16451] should_failslab+0x5/0x20 [ 809.691938][T16451] slab_pre_alloc_hook+0x51/0xc0 [ 809.696991][T16451] __kmalloc_node_track_caller+0x68/0x3a0 [ 809.702746][T16451] ? netlink_sendmsg+0x654/0xbe0 [ 809.707703][T16451] ? kmem_cache_alloc_node+0x162/0x2d0 [ 809.713185][T16451] ? __alloc_skb+0xf4/0x750 [ 809.717713][T16451] ? netlink_sendmsg+0x654/0xbe0 [ 809.722674][T16451] __alloc_skb+0x22c/0x750 [ 809.727119][T16451] netlink_sendmsg+0x654/0xbe0 [ 809.731911][T16451] ? netlink_getsockopt+0x570/0x570 [ 809.737171][T16451] ? aa_sock_msg_perm+0x94/0x150 [ 809.742132][T16451] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 809.747439][T16451] ? security_socket_sendmsg+0x7c/0xa0 [ 809.753064][T16451] ? netlink_getsockopt+0x570/0x570 [ 809.758287][T16451] ____sys_sendmsg+0x5b7/0x8f0 [ 809.763105][T16451] ? __sys_sendmsg_sock+0x30/0x30 [ 809.768167][T16451] ? import_iovec+0x6f/0xa0 [ 809.772699][T16451] ___sys_sendmsg+0x236/0x2e0 [ 809.777425][T16451] ? __sys_sendmsg+0x2a0/0x2a0 [ 809.782224][T16451] ? trace_event_raw_event_lock+0x270/0x270 [ 809.788141][T16451] ? vfs_write+0x8b2/0xd60 [ 809.792607][T16451] __se_sys_sendmsg+0x1af/0x290 [ 809.797587][T16451] ? __x64_sys_sendmsg+0x80/0x80 [ 809.802555][T16451] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 809.808575][T16451] ? trace_sys_enter+0x1f/0x80 [ 809.813369][T16451] do_syscall_64+0x4c/0xa0 [ 809.817809][T16451] ? clear_bhb_loop+0x30/0x80 [ 809.822517][T16451] ? clear_bhb_loop+0x30/0x80 [ 809.827229][T16451] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 809.833153][T16451] RIP: 0033:0x7f0db7128819 [ 809.837594][T16451] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 809.857410][T16451] RSP: 002b:00007f0db5382028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 809.865954][T16451] RAX: ffffffffffffffda RBX: 00007f0db73a1fa0 RCX: 00007f0db7128819 [ 809.873957][T16451] RDX: 0000000004004010 RSI: 0000200000000240 RDI: 0000000000000003 [ 809.882117][T16451] RBP: 00007f0db5382090 R08: 0000000000000000 R09: 0000000000000000 [ 809.890113][T16451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.898137][T16451] R13: 00007f0db73a2038 R14: 00007f0db73a1fa0 R15: 00007ffce55c5048 [ 809.906154][T16451] [ 810.942235][T16467] netlink: 'syz.3.3541': attribute type 7 has an invalid length. [ 810.975479][T16467] netlink: 'syz.3.3541': attribute type 1 has an invalid length. [ 811.441136][T16467] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.3541'. [ 813.345243][ C1] net_ratelimit: 7872 callbacks suppressed [ 813.345265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.351587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.363470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.376213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.387757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 813.399691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.411631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 813.424164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.436361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.447626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 813.762717][T16485] netlink: 129384 bytes leftover after parsing attributes in process `syz.5.3542'. [ 814.089510][T16494] FAULT_INJECTION: forcing a failure. [ 814.089510][T16494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 814.161026][T16494] CPU: 0 PID: 16494 Comm: syz.4.3545 Not tainted syzkaller #0 [ 814.168556][T16494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 814.178741][T16494] Call Trace: [ 814.182046][T16494] [ 814.184987][T16494] dump_stack_lvl+0x188/0x250 [ 814.189681][T16494] ? show_regs_print_info+0x20/0x20 [ 814.194889][T16494] ? load_image+0x400/0x400 [ 814.199398][T16494] ? __lock_acquire+0x7d10/0x7d10 [ 814.204441][T16494] should_fail+0x38c/0x4c0 [ 814.208867][T16494] _copy_from_user+0x2e/0x170 [ 814.213548][T16494] bpf_test_init+0x136/0x1b0 [ 814.218151][T16494] bpf_prog_test_run_skb+0x181/0x1180 [ 814.223615][T16494] ? __fget_files+0x40f/0x480 [ 814.228305][T16494] ? cpu_online+0x60/0x60 [ 814.232638][T16494] bpf_prog_test_run+0x31e/0x390 [ 814.237584][T16494] __sys_bpf+0x5a5/0x6f0 [ 814.241828][T16494] ? bpf_link_show_fdinfo+0x380/0x380 [ 814.247212][T16494] ? vtime_user_exit+0x2c8/0x3e0 [ 814.252161][T16494] __x64_sys_bpf+0x78/0x90 [ 814.256579][T16494] do_syscall_64+0x4c/0xa0 [ 814.260994][T16494] ? clear_bhb_loop+0x30/0x80 [ 814.265758][T16494] ? clear_bhb_loop+0x30/0x80 [ 814.270436][T16494] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 814.276331][T16494] RIP: 0033:0x7f9b1c403819 [ 814.280752][T16494] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 814.300359][T16494] RSP: 002b:00007f9b1a65d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 814.308863][T16494] RAX: ffffffffffffffda RBX: 00007f9b1c67cfa0 RCX: 00007f9b1c403819 [ 814.316871][T16494] RDX: 0000000000000050 RSI: 0000200000000500 RDI: 000000000000000a [ 814.325038][T16494] RBP: 00007f9b1a65d090 R08: 0000000000000000 R09: 0000000000000000 [ 814.333028][T16494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 814.341015][T16494] R13: 00007f9b1c67d038 R14: 00007f9b1c67cfa0 R15: 00007ffe5cde8518 [ 814.349008][T16494] [ 816.844944][T16533] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.3558'. [ 817.785251][T16563] FAULT_INJECTION: forcing a failure. [ 817.785251][T16563] name failslab, interval 1, probability 0, space 0, times 0 [ 817.827067][T16563] CPU: 0 PID: 16563 Comm: syz.3.3567 Not tainted syzkaller #0 [ 817.834584][T16563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 817.844877][T16563] Call Trace: [ 817.848177][T16563] [ 817.851121][T16563] dump_stack_lvl+0x188/0x250 [ 817.855824][T16563] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 817.862092][T16563] ? show_regs_print_info+0x20/0x20 [ 817.867650][T16563] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 817.873846][T16563] should_fail+0x38c/0x4c0 [ 817.878300][T16563] should_failslab+0x5/0x20 [ 817.882816][T16563] slab_pre_alloc_hook+0x51/0xc0 [ 817.887864][T16563] __kmalloc+0x6b/0x330 [ 817.892080][T16563] ? bpf_test_init+0xf8/0x1b0 [ 817.896776][T16563] ? __lock_acquire+0x7d10/0x7d10 [ 817.901913][T16563] bpf_test_init+0xf8/0x1b0 [ 817.906442][T16563] bpf_prog_test_run_skb+0x181/0x1180 [ 817.911831][T16563] ? __fget_files+0x40f/0x480 [ 817.916528][T16563] ? cpu_online+0x60/0x60 [ 817.920869][T16563] bpf_prog_test_run+0x31e/0x390 [ 817.925828][T16563] __sys_bpf+0x5a5/0x6f0 [ 817.930611][T16563] ? bpf_link_show_fdinfo+0x380/0x380 [ 817.936020][T16563] __x64_sys_bpf+0x78/0x90 [ 817.940455][T16563] do_syscall_64+0x4c/0xa0 [ 817.944882][T16563] ? clear_bhb_loop+0x30/0x80 [ 817.949570][T16563] ? clear_bhb_loop+0x30/0x80 [ 817.954349][T16563] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 817.960257][T16563] RIP: 0033:0x7f0db7128819 [ 817.964713][T16563] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 817.984338][T16563] RSP: 002b:00007f0db5382028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 817.992776][T16563] RAX: ffffffffffffffda RBX: 00007f0db73a1fa0 RCX: 00007f0db7128819 [ 818.000762][T16563] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 818.008831][T16563] RBP: 00007f0db5382090 R08: 0000000000000000 R09: 0000000000000000 [ 818.016817][T16563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 818.024802][T16563] R13: 00007f0db73a2038 R14: 00007f0db73a1fa0 R15: 00007ffce55c5048 [ 818.032994][T16563] [ 818.366401][ C1] net_ratelimit: 6682 callbacks suppressed [ 818.366422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:05:7b:af:a7:85, vlan:0) [ 818.373231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.385054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.403221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.408950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.432709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.433134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 818.449480][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 818.457134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 818.457720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 822.784459][T16605] FAULT_INJECTION: forcing a failure. [ 822.784459][T16605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 822.820018][T16610] netlink: 'syz.4.3579': attribute type 12 has an invalid length. [ 822.835568][T16608] netlink: 'syz.5.3581': attribute type 4 has an invalid length. [ 822.881423][T16608] netlink: 152 bytes leftover after parsing attributes in process `syz.5.3581'. [ 822.891384][T16605] CPU: 0 PID: 16605 Comm: syz.3.3580 Not tainted syzkaller #0 [ 822.898878][T16605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 822.908992][T16605] Call Trace: [ 822.912286][T16605] [ 822.915228][T16605] dump_stack_lvl+0x188/0x250 [ 822.919932][T16605] ? show_regs_print_info+0x20/0x20 [ 822.925147][T16605] ? load_image+0x400/0x400 [ 822.929677][T16605] ? __lock_acquire+0x7d10/0x7d10 [ 822.934734][T16605] should_fail+0x38c/0x4c0 [ 822.939178][T16605] _copy_from_user+0x2e/0x170 [ 822.943873][T16605] bpf_test_init+0x136/0x1b0 [ 822.948487][T16605] bpf_prog_test_run_skb+0x181/0x1180 [ 822.953880][T16605] ? __fget_files+0x40f/0x480 [ 822.958589][T16605] ? cpu_online+0x60/0x60 [ 822.962952][T16605] bpf_prog_test_run+0x31e/0x390 [ 822.967924][T16605] __sys_bpf+0x5a5/0x6f0 [ 822.972198][T16605] ? bpf_link_show_fdinfo+0x380/0x380 [ 822.977617][T16605] __x64_sys_bpf+0x78/0x90 [ 822.982058][T16605] do_syscall_64+0x4c/0xa0 [ 822.986507][T16605] ? clear_bhb_loop+0x30/0x80 [ 822.991206][T16605] ? clear_bhb_loop+0x30/0x80 [ 822.995889][T16605] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 823.001783][T16605] RIP: 0033:0x7f0db7128819 [ 823.006205][T16605] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 823.025822][T16605] RSP: 002b:00007f0db5382028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 823.034326][T16605] RAX: ffffffffffffffda RBX: 00007f0db73a1fa0 RCX: 00007f0db7128819 [ 823.042299][T16605] RDX: 0000000000000050 RSI: 0000200000000500 RDI: 000000000000000a [ 823.050296][T16605] RBP: 00007f0db5382090 R08: 0000000000000000 R09: 0000000000000000 [ 823.058385][T16605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 823.066464][T16605] R13: 00007f0db73a2038 R14: 00007f0db73a1fa0 R15: 00007ffce55c5048 [ 823.074480][T16605] [ 823.102481][T16610] netlink: 'syz.4.3579': attribute type 11 has an invalid length. [ 823.134144][T16610] netlink: 178840 bytes leftover after parsing attributes in process `syz.4.3579'. [ 823.375108][ C0] net_ratelimit: 9615 callbacks suppressed [ 823.375130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.393422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.406444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.418840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.431837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.444124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 823.444216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.456444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 823.468938][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 823.480656][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 823.757558][T16619] delete_channel: no stack [ 823.787049][T16626] netlink: 55631 bytes leftover after parsing attributes in process `syz.5.3586'. [ 824.318438][T16641] netlink: 56537 bytes leftover after parsing attributes in process `syz.4.3590'. [ 824.340395][T16642] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 824.751592][T16651] FAULT_INJECTION: forcing a failure. [ 824.751592][T16651] name failslab, interval 1, probability 0, space 0, times 0 [ 824.814923][T16651] CPU: 1 PID: 16651 Comm: syz.1.3589 Not tainted syzkaller #0 [ 824.822445][T16651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 824.832529][T16651] Call Trace: [ 824.835839][T16651] [ 824.838791][T16651] dump_stack_lvl+0x188/0x250 [ 824.843498][T16651] ? show_regs_print_info+0x20/0x20 [ 824.848719][T16651] ? load_image+0x400/0x400 [ 824.853245][T16651] ? __might_sleep+0xf0/0xf0 [ 824.857859][T16651] ? __lock_acquire+0x7d10/0x7d10 [ 824.862915][T16651] should_fail+0x38c/0x4c0 [ 824.867366][T16651] should_failslab+0x5/0x20 [ 824.871908][T16651] slab_pre_alloc_hook+0x51/0xc0 [ 824.876861][T16651] __kmalloc_node_track_caller+0x68/0x3a0 [ 824.882585][T16651] ? alloc_skb_with_frags+0xa7/0x730 [ 824.887865][T16651] ? kmem_cache_alloc_node+0x162/0x2d0 [ 824.893321][T16651] ? __alloc_skb+0xf4/0x750 [ 824.897828][T16651] ? alloc_skb_with_frags+0xa7/0x730 [ 824.903116][T16651] __alloc_skb+0x22c/0x750 [ 824.907538][T16651] alloc_skb_with_frags+0xa7/0x730 [ 824.912671][T16651] sock_alloc_send_pskb+0x87f/0x9a0 [ 824.917907][T16651] ? sock_kzfree_s+0x50/0x50 [ 824.922613][T16651] ? do_raw_spin_lock+0x128/0x2f0 [ 824.927657][T16651] ? __rwlock_init+0x140/0x140 [ 824.932444][T16651] ? do_raw_spin_unlock+0x11d/0x230 [ 824.937663][T16651] unix_dgram_sendmsg+0x5fc/0x18a0 [ 824.942818][T16651] ? aa_sk_perm+0x7dc/0x910 [ 824.947352][T16651] ? unix_dgram_poll+0x680/0x680 [ 824.952321][T16651] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 824.958778][T16651] ? aa_sock_msg_perm+0x94/0x150 [ 824.963761][T16651] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 824.969102][T16651] ? security_socket_sendmsg+0x7c/0xa0 [ 824.974572][T16651] ? unix_dgram_poll+0x680/0x680 [ 824.979533][T16651] ____sys_sendmsg+0x5b7/0x8f0 [ 824.984332][T16651] ? __sys_sendmsg_sock+0x30/0x30 [ 824.989383][T16651] ? import_iovec+0x6f/0xa0 [ 824.993901][T16651] ___sys_sendmsg+0x236/0x2e0 [ 824.998589][T16651] ? __sys_sendmsg+0x2a0/0x2a0 [ 825.003373][T16651] ? vfs_write+0x8b2/0xd60 [ 825.007809][T16651] __se_sys_sendmsg+0x1af/0x290 [ 825.012665][T16651] ? __x64_sys_sendmsg+0x80/0x80 [ 825.017605][T16651] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 825.023598][T16651] ? lockdep_hardirqs_on+0x94/0x140 [ 825.028799][T16651] do_syscall_64+0x4c/0xa0 [ 825.033216][T16651] ? clear_bhb_loop+0x30/0x80 [ 825.037895][T16651] ? clear_bhb_loop+0x30/0x80 [ 825.042575][T16651] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 825.048470][T16651] RIP: 0033:0x7f97b0404819 [ 825.052888][T16651] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 825.072496][T16651] RSP: 002b:00007f97ae63d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 825.080911][T16651] RAX: ffffffffffffffda RBX: 00007f97b067e090 RCX: 00007f97b0404819 [ 825.088886][T16651] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000008 [ 825.096856][T16651] RBP: 00007f97ae63d090 R08: 0000000000000000 R09: 0000000000000000 [ 825.104827][T16651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 825.112799][T16651] R13: 00007f97b067e128 R14: 00007f97b067e090 R15: 00007ffe7f438cd8 [ 825.120797][T16651] [ 827.476953][T16687] FAULT_INJECTION: forcing a failure. [ 827.476953][T16687] name failslab, interval 1, probability 0, space 0, times 0 [ 827.898825][T16687] CPU: 1 PID: 16687 Comm: syz.1.3597 Not tainted syzkaller #0 [ 827.906362][T16687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 827.916448][T16687] Call Trace: [ 827.919741][T16687] [ 827.922675][T16687] dump_stack_lvl+0x188/0x250 [ 827.927370][T16687] ? show_regs_print_info+0x20/0x20 [ 827.932577][T16687] ? load_image+0x400/0x400 [ 827.937093][T16687] ? __might_sleep+0xf0/0xf0 [ 827.941784][T16687] ? __lock_acquire+0x7d10/0x7d10 [ 827.946811][T16687] ? memset+0x1e/0x40 [ 827.950805][T16687] should_fail+0x38c/0x4c0 [ 827.955233][T16687] should_failslab+0x5/0x20 [ 827.959738][T16687] slab_pre_alloc_hook+0x51/0xc0 [ 827.964677][T16687] ? security_inode_alloc+0x30/0x110 [ 827.969968][T16687] kmem_cache_alloc+0x3d/0x290 [ 827.974744][T16687] security_inode_alloc+0x30/0x110 [ 827.979866][T16687] inode_init_always+0x8f4/0xcb0 [ 827.984814][T16687] iget_locked+0x20f/0x820 [ 827.989241][T16687] ? mark_lock+0x94/0x320 [ 827.993573][T16687] kernfs_get_inode+0x4b/0x6d0 [ 827.998349][T16687] cgroup_attach_permissions+0x2bc/0xa90 [ 828.003996][T16687] __cgroup_procs_write+0x1e4/0x350 [ 828.009204][T16687] cgroup_procs_write+0x23/0x40 [ 828.014062][T16687] ? cgroup_procs_next+0xa0/0xa0 [ 828.019004][T16687] cgroup_file_write+0x2c3/0x660 [ 828.023946][T16687] ? read_lock_is_recursive+0x10/0x10 [ 828.029329][T16687] ? cgroup_seqfile_stop+0xd0/0xd0 [ 828.034457][T16687] ? cgroup_seqfile_stop+0xd0/0xd0 [ 828.039568][T16687] kernfs_fop_write_iter+0x379/0x4c0 [ 828.044866][T16687] vfs_write+0x745/0xd60 [ 828.049122][T16687] ? file_end_write+0x250/0x250 [ 828.053987][T16687] ? __fget_files+0x40f/0x480 [ 828.058678][T16687] ? mutex_lock_nested+0x17/0x20 [ 828.063619][T16687] ? __fdget_pos+0x2bf/0x370 [ 828.068205][T16687] ? ksys_write+0x71/0x260 [ 828.072625][T16687] ksys_write+0x152/0x260 [ 828.076959][T16687] ? __ia32_sys_read+0x80/0x80 [ 828.081733][T16687] ? lockdep_hardirqs_on+0x94/0x140 [ 828.086938][T16687] do_syscall_64+0x4c/0xa0 [ 828.091361][T16687] ? clear_bhb_loop+0x30/0x80 [ 828.096039][T16687] ? clear_bhb_loop+0x30/0x80 [ 828.100730][T16687] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 828.106626][T16687] RIP: 0033:0x7f97b0404819 [ 828.111044][T16687] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 828.130670][T16687] RSP: 002b:00007f97ae61c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 828.139233][T16687] RAX: ffffffffffffffda RBX: 00007f97b067e180 RCX: 00007f97b0404819 [ 828.147227][T16687] RDX: 0000000000000012 RSI: 00002000000005c0 RDI: 0000000000000005 [ 828.155210][T16687] RBP: 00007f97ae61c090 R08: 0000000000000000 R09: 0000000000000000 [ 828.163198][T16687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 828.171174][T16687] R13: 00007f97b067e218 R14: 00007f97b067e180 R15: 00007ffe7f438cd8 [ 828.179172][T16687] [ 828.385151][ C0] net_ratelimit: 7800 callbacks suppressed [ 828.385173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.393008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.403592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.415601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.428217][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.439649][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 828.451511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.463531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 828.476139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 828.487811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.394890][ C1] net_ratelimit: 6481 callbacks suppressed [ 833.394912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.400682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.401109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.431862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.437180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 833.455554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.461134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.461889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 833.462299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:05:7b:af:a7:85, vlan:0) [ 833.463024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 833.968247][T16739] FAULT_INJECTION: forcing a failure. [ 833.968247][T16739] name failslab, interval 1, probability 0, space 0, times 0 [ 834.058349][T16739] CPU: 0 PID: 16739 Comm: syz.3.3613 Not tainted syzkaller #0 [ 834.066308][T16739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 834.076397][T16739] Call Trace: [ 834.079911][T16739] [ 834.082868][T16739] dump_stack_lvl+0x188/0x250 [ 834.087573][T16739] ? show_regs_print_info+0x20/0x20 [ 834.092795][T16739] ? load_image+0x400/0x400 [ 834.097312][T16739] ? __might_sleep+0xf0/0xf0 [ 834.101915][T16739] ? __lock_acquire+0x7d10/0x7d10 [ 834.106964][T16739] should_fail+0x38c/0x4c0 [ 834.111400][T16739] should_failslab+0x5/0x20 [ 834.115915][T16739] slab_pre_alloc_hook+0x51/0xc0 [ 834.120923][T16739] kmem_cache_alloc_node+0x47/0x2d0 [ 834.126229][T16739] ? __alloc_skb+0xf4/0x750 [ 834.130942][T16739] __alloc_skb+0xf4/0x750 [ 834.135294][T16739] alloc_skb_with_frags+0xa7/0x730 [ 834.140434][T16739] sock_alloc_send_pskb+0x87f/0x9a0 [ 834.145736][T16739] ? lock_chain_count+0x20/0x20 [ 834.150614][T16739] ? sock_kzfree_s+0x50/0x50 [ 834.155223][T16739] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 834.161402][T16739] unix_dgram_sendmsg+0x5fc/0x18a0 [ 834.166531][T16739] ? rcu_is_watching+0x11/0xa0 [ 834.171317][T16739] ? aa_sk_perm+0x7dc/0x910 [ 834.175838][T16739] ? unix_dgram_poll+0x680/0x680 [ 834.180916][T16739] ? aa_sock_msg_perm+0x28/0x150 [ 834.185894][T16739] ? aa_sock_msg_perm+0x94/0x150 [ 834.190864][T16739] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 834.196168][T16739] ? security_socket_sendmsg+0x7c/0xa0 [ 834.201647][T16739] ? unix_dgram_poll+0x680/0x680 [ 834.206601][T16739] ____sys_sendmsg+0x5b7/0x8f0 [ 834.211389][T16739] ? __sys_sendmsg_sock+0x30/0x30 [ 834.216439][T16739] ? import_iovec+0x6f/0xa0 [ 834.221145][T16739] ___sys_sendmsg+0x236/0x2e0 [ 834.225851][T16739] ? __sys_sendmsg+0x2a0/0x2a0 [ 834.230728][T16739] ? ktime_get_real_ts64+0x440/0x440 [ 834.236052][T16739] __se_sys_sendmsg+0x1af/0x290 [ 834.240918][T16739] ? __x64_sys_sendmsg+0x80/0x80 [ 834.245868][T16739] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 834.251878][T16739] ? lockdep_hardirqs_on+0x94/0x140 [ 834.257305][T16739] do_syscall_64+0x4c/0xa0 [ 834.261733][T16739] ? clear_bhb_loop+0x30/0x80 [ 834.266424][T16739] ? clear_bhb_loop+0x30/0x80 [ 834.271116][T16739] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 834.277066][T16739] RIP: 0033:0x7f0db7128819 [ 834.281513][T16739] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 834.301221][T16739] RSP: 002b:00007f0db5361028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 834.309673][T16739] RAX: ffffffffffffffda RBX: 00007f0db73a2090 RCX: 00007f0db7128819 [ 834.317665][T16739] RDX: 0000000000020000 RSI: 0000200000001e80 RDI: 0000000000000006 [ 834.325661][T16739] RBP: 00007f0db5361090 R08: 0000000000000000 R09: 0000000000000000 [ 834.333653][T16739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 834.341776][T16739] R13: 00007f0db73a2128 R14: 00007f0db73a2090 R15: 00007ffce55c5048 [ 834.349880][T16739] [ 834.988842][T16763] netlink: 10 bytes leftover after parsing attributes in process `syz.1.3618'. [ 835.085424][T16772] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3620'. [ 836.711132][T16783] netlink: 'syz.4.3623': attribute type 21 has an invalid length. [ 836.818945][T16783] netlink: 'syz.4.3623': attribute type 1 has an invalid length. [ 836.886776][T16783] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3623'. [ 837.455918][T16792] FAULT_INJECTION: forcing a failure. [ 837.455918][T16792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 837.527904][T16792] CPU: 0 PID: 16792 Comm: syz.4.3625 Not tainted syzkaller #0 [ 837.535469][T16792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 837.545596][T16792] Call Trace: [ 837.548922][T16792] [ 837.551897][T16792] dump_stack_lvl+0x188/0x250 [ 837.556656][T16792] ? show_regs_print_info+0x20/0x20 [ 837.561912][T16792] ? load_image+0x400/0x400 [ 837.566484][T16792] ? __lock_acquire+0x7d10/0x7d10 [ 837.571564][T16792] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 837.577441][T16792] should_fail+0x38c/0x4c0 [ 837.581938][T16792] _copy_from_user+0x2e/0x170 [ 837.586681][T16792] __copy_msghdr_from_user+0x48a/0x630 [ 837.592193][T16792] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 837.597982][T16792] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 837.603420][T16792] ___sys_sendmsg+0x19a/0x2e0 [ 837.608202][T16792] ? __sys_sendmsg+0x2a0/0x2a0 [ 837.613123][T16792] ? trace_event_raw_event_lock+0x270/0x270 [ 837.619062][T16792] ? vfs_write+0x8b2/0xd60 [ 837.623667][T16792] __se_sys_sendmsg+0x1af/0x290 [ 837.628587][T16792] ? __x64_sys_sendmsg+0x80/0x80 [ 837.633565][T16792] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 837.639671][T16792] ? lockdep_hardirqs_on+0x94/0x140 [ 837.644939][T16792] do_syscall_64+0x4c/0xa0 [ 837.649399][T16792] ? clear_bhb_loop+0x30/0x80 [ 837.654125][T16792] ? clear_bhb_loop+0x30/0x80 [ 837.658858][T16792] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 837.664794][T16792] RIP: 0033:0x7f9b1c403819 [ 837.669263][T16792] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 837.689000][T16792] RSP: 002b:00007f9b1a65d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 837.697480][T16792] RAX: ffffffffffffffda RBX: 00007f9b1c67cfa0 RCX: 00007f9b1c403819 [ 837.705494][T16792] RDX: 0000000000000060 RSI: 0000200000000080 RDI: 0000000000000004 [ 837.713505][T16792] RBP: 00007f9b1a65d090 R08: 0000000000000000 R09: 0000000000000000 [ 837.721517][T16792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 837.729524][T16792] R13: 00007f9b1c67d038 R14: 00007f9b1c67cfa0 R15: 00007ffe5cde8518 [ 837.737624][T16792] [ 837.793571][T16800] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.3628'. [ 837.825601][T16800] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 837.947398][T16800] CPU: 1 PID: 16800 Comm: syz.5.3628 Not tainted syzkaller #0 [ 837.954931][T16800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 837.965024][T16800] Call Trace: [ 837.968330][T16800] [ 837.971287][T16800] dump_stack_lvl+0x188/0x250 [ 837.975997][T16800] ? show_regs_print_info+0x20/0x20 [ 837.981316][T16800] ? load_image+0x400/0x400 [ 837.985882][T16800] sysfs_warn_dup+0x8a/0xa0 [ 837.990431][T16800] sysfs_do_create_link_sd+0xc0/0x110 [ 837.995848][T16800] device_add+0x7ed/0xfb0 [ 838.000231][T16800] wiphy_register+0x1e81/0x2c30 [ 838.005145][T16800] ? cfg80211_event_work+0x40/0x40 [ 838.010303][T16800] ? minstrel_ht_alloc+0x808/0x980 [ 838.015563][T16800] ? ieee80211_init_rate_ctrl_alg+0x55e/0x5e0 [ 838.021671][T16800] ieee80211_register_hw+0x2aa1/0x3af0 [ 838.027199][T16800] ? ieee80211_tasklet_handler+0x20/0x20 [ 838.032961][T16800] ? rcu_is_watching+0x11/0xa0 [ 838.037905][T16800] ? memset+0x1e/0x40 [ 838.042009][T16800] ? hrtimer_init+0x10c/0x220 [ 838.046727][T16800] mac80211_hwsim_new_radio+0x20d3/0x4080 [ 838.052509][T16800] hwsim_new_radio_nl+0xa6f/0xc40 [ 838.057592][T16800] genl_rcv_msg+0xcea/0xf90 [ 838.062147][T16800] ? genl_bind+0x380/0x380 [ 838.066605][T16800] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 838.072450][T16800] ? verify_lock_unused+0x140/0x140 [ 838.077768][T16800] ? perf_trace_lock_acquire+0x340/0x3e0 [ 838.083533][T16800] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 838.090167][T16800] ? perf_trace_lock+0xe4/0x390 [ 838.095053][T16800] ? hwsim_tx_info_frame_received_nl+0x1020/0x1020 [ 838.101620][T16800] netlink_rcv_skb+0x1f5/0x440 [ 838.106417][T16800] ? genl_bind+0x380/0x380 [ 838.110881][T16800] ? netlink_ack+0xb50/0xb50 [ 838.115508][T16800] ? __lock_acquire+0x7d10/0x7d10 [ 838.120580][T16800] ? down_read+0x1aa/0x2e0 [ 838.125042][T16800] genl_rcv+0x24/0x40 [ 838.129051][T16800] netlink_unicast+0x774/0x920 [ 838.133854][T16800] netlink_sendmsg+0x8ba/0xbe0 [ 838.138745][T16800] ? netlink_getsockopt+0x570/0x570 [ 838.144067][T16800] ? aa_sock_msg_perm+0x94/0x150 [ 838.149041][T16800] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 838.154353][T16800] ? security_socket_sendmsg+0x7c/0xa0 [ 838.159839][T16800] ? netlink_getsockopt+0x570/0x570 [ 838.165068][T16800] ____sys_sendmsg+0x5b7/0x8f0 [ 838.169874][T16800] ? __sys_sendmsg_sock+0x30/0x30 [ 838.175079][T16800] ? import_iovec+0x6f/0xa0 [ 838.179627][T16800] ___sys_sendmsg+0x236/0x2e0 [ 838.184361][T16800] ? __sys_sendmsg+0x2a0/0x2a0 [ 838.189190][T16800] ? trace_event_raw_event_lock+0x270/0x270 [ 838.195252][T16800] __se_sys_sendmsg+0x1af/0x290 [ 838.200249][T16800] ? __x64_sys_sendmsg+0x80/0x80 [ 838.205220][T16800] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 838.211257][T16800] ? lockdep_hardirqs_on+0x94/0x140 [ 838.216497][T16800] do_syscall_64+0x4c/0xa0 [ 838.220941][T16800] ? clear_bhb_loop+0x30/0x80 [ 838.225650][T16800] ? clear_bhb_loop+0x30/0x80 [ 838.230365][T16800] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 838.236288][T16800] RIP: 0033:0x7f6da65fc819 [ 838.240893][T16800] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 838.260633][T16800] RSP: 002b:00007f6da4835028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 838.269185][T16800] RAX: ffffffffffffffda RBX: 00007f6da6876090 RCX: 00007f6da65fc819 [ 838.277199][T16800] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000d [ 838.285206][T16800] RBP: 00007f6da6692c91 R08: 0000000000000000 R09: 0000000000000000 [ 838.293219][T16800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 838.301226][T16800] R13: 00007f6da6876128 R14: 00007f6da6876090 R15: 00007ffd41b2b668 [ 838.309254][T16800] [ 838.441242][ C1] net_ratelimit: 6114 callbacks suppressed [ 838.441263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.448643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.459578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:05:7b:af:a7:85, vlan:0) [ 838.472094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.483808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.495675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.507654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.520439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 838.532104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 838.543908][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 839.474580][T16807] bridge0: port 3(gretap0) entered blocking state [ 839.481145][T16807] bridge0: port 3(gretap0) entered disabled state [ 839.550404][T16807] device gretap0 entered promiscuous mode [ 839.579441][T16807] bridge0: port 3(gretap0) entered blocking state [ 839.586016][T16807] bridge0: port 3(gretap0) entered forwarding state [ 841.192859][T16848] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3641'. [ 841.580667][T16852] netlink: 'syz.1.3643': attribute type 21 has an invalid length. [ 841.647672][T16852] netlink: 'syz.1.3643': attribute type 12 has an invalid length. [ 841.705945][T16852] netlink: 'syz.1.3643': attribute type 13 has an invalid length. [ 841.720456][T16857] FAULT_INJECTION: forcing a failure. [ 841.720456][T16857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.795020][T16852] netlink: 'syz.1.3643': attribute type 14 has an invalid length. [ 841.804103][T16852] netlink: 'syz.1.3643': attribute type 15 has an invalid length. [ 841.826376][T16857] CPU: 1 PID: 16857 Comm: syz.6.3644 Not tainted syzkaller #0 [ 841.833895][T16857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 841.834717][T16852] netlink: 'syz.1.3643': attribute type 16 has an invalid length. [ 841.844057][T16857] Call Trace: [ 841.844073][T16857] [ 841.844084][T16857] dump_stack_lvl+0x188/0x250 [ 841.844118][T16857] ? show_regs_print_info+0x20/0x20 [ 841.844144][T16857] ? load_image+0x400/0x400 [ 841.844171][T16857] ? __lock_acquire+0x7d10/0x7d10 [ 841.844196][T16857] ? __rcu_read_unlock+0x2e/0xd0 [ 841.844221][T16857] should_fail+0x38c/0x4c0 [ 841.844258][T16857] _copy_from_user+0x2e/0x170 [ 841.844285][T16857] bpf_test_init+0x136/0x1b0 [ 841.844313][T16857] bpf_prog_test_run_skb+0x181/0x1180 [ 841.844337][T16857] ? lockdep_hardirqs_on+0x94/0x140 [ 841.844363][T16857] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 841.844400][T16857] ? cpu_online+0x60/0x60 [ 841.844422][T16857] bpf_prog_test_run+0x31e/0x390 [ 841.844448][T16857] __sys_bpf+0x5a5/0x6f0 [ 841.844474][T16857] ? bpf_link_show_fdinfo+0x380/0x380 [ 841.844521][T16857] __x64_sys_bpf+0x78/0x90 [ 841.844545][T16857] do_syscall_64+0x4c/0xa0 [ 841.844563][T16857] ? clear_bhb_loop+0x30/0x80 [ 841.844581][T16857] ? clear_bhb_loop+0x30/0x80 [ 841.844604][T16857] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 841.844626][T16857] RIP: 0033:0x7f51fc6b5819 [ 841.844648][T16857] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 841.844666][T16857] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 841.844691][T16857] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 841.844707][T16857] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 841.844721][T16857] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 841.844736][T16857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.844749][T16857] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 841.844784][T16857] [ 842.482138][T16852] netlink: 'syz.1.3643': attribute type 19 has an invalid length. [ 842.515667][T16852] netlink: 'syz.1.3643': attribute type 21 has an invalid length. [ 842.542549][T16852] netlink: 'syz.1.3643': attribute type 22 has an invalid length. [ 842.929772][T16852] netlink: 12226 bytes leftover after parsing attributes in process `syz.1.3643'. [ 843.227015][T16873] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.3648'. [ 843.445324][ C1] net_ratelimit: 5243 callbacks suppressed [ 843.445344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.451021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.451626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.464118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.476111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 843.488769][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.500438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.512587][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 843.525126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.537147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 844.002337][T16894] FAULT_INJECTION: forcing a failure. [ 844.002337][T16894] name failslab, interval 1, probability 0, space 0, times 0 [ 844.224603][T16894] CPU: 1 PID: 16894 Comm: syz.6.3655 Not tainted syzkaller #0 [ 844.232148][T16894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 844.242338][T16894] Call Trace: [ 844.245651][T16894] [ 844.248616][T16894] dump_stack_lvl+0x188/0x250 [ 844.253353][T16894] ? show_regs_print_info+0x20/0x20 [ 844.258597][T16894] ? load_image+0x400/0x400 [ 844.263157][T16894] ? __might_sleep+0xf0/0xf0 [ 844.267795][T16894] ? __lock_acquire+0x7d10/0x7d10 [ 844.272876][T16894] should_fail+0x38c/0x4c0 [ 844.277364][T16894] should_failslab+0x5/0x20 [ 844.281905][T16894] slab_pre_alloc_hook+0x51/0xc0 [ 844.286980][T16894] __kmalloc_node_track_caller+0x68/0x3a0 [ 844.292732][T16894] ? netlink_sendmsg+0x654/0xbe0 [ 844.297709][T16894] ? kmem_cache_alloc_node+0x162/0x2d0 [ 844.303210][T16894] ? __alloc_skb+0xf4/0x750 [ 844.307760][T16894] ? netlink_sendmsg+0x654/0xbe0 [ 844.312745][T16894] __alloc_skb+0x22c/0x750 [ 844.317363][T16894] netlink_sendmsg+0x654/0xbe0 [ 844.322243][T16894] ? netlink_getsockopt+0x570/0x570 [ 844.327509][T16894] ? aa_sock_msg_perm+0x94/0x150 [ 844.332518][T16894] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 844.337934][T16894] ? security_socket_sendmsg+0x7c/0xa0 [ 844.343538][T16894] ? netlink_getsockopt+0x570/0x570 [ 844.348779][T16894] ____sys_sendmsg+0x5b7/0x8f0 [ 844.353625][T16894] ? __sys_sendmsg_sock+0x30/0x30 [ 844.358728][T16894] ? import_iovec+0x6f/0xa0 [ 844.363287][T16894] ___sys_sendmsg+0x236/0x2e0 [ 844.368039][T16894] ? __sys_sendmsg+0x2a0/0x2a0 [ 844.372898][T16894] ? trace_event_raw_event_lock+0x270/0x270 [ 844.378918][T16894] ? vfs_write+0x8b2/0xd60 [ 844.383467][T16894] __se_sys_sendmsg+0x1af/0x290 [ 844.388370][T16894] ? __x64_sys_sendmsg+0x80/0x80 [ 844.393431][T16894] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 844.399500][T16894] ? lockdep_hardirqs_on+0x94/0x140 [ 844.404930][T16894] do_syscall_64+0x4c/0xa0 [ 844.409473][T16894] ? clear_bhb_loop+0x30/0x80 [ 844.414184][T16894] ? clear_bhb_loop+0x30/0x80 [ 844.418913][T16894] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 844.424840][T16894] RIP: 0033:0x7f51fc6b5819 [ 844.429293][T16894] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 844.449129][T16894] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.457612][T16894] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 844.465712][T16894] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 844.473725][T16894] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 844.481747][T16894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 844.489767][T16894] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 844.497849][T16894] [ 845.471590][T16903] FAULT_INJECTION: forcing a failure. [ 845.471590][T16903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 845.652970][T16903] CPU: 1 PID: 16903 Comm: syz.4.3657 Not tainted syzkaller #0 [ 845.660825][T16903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 845.670912][T16903] Call Trace: [ 845.674226][T16903] [ 845.677175][T16903] dump_stack_lvl+0x188/0x250 [ 845.681889][T16903] ? show_regs_print_info+0x20/0x20 [ 845.687149][T16903] ? lockdep_hardirqs_on+0x94/0x140 [ 845.692383][T16903] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 845.698660][T16903] should_fail+0x38c/0x4c0 [ 845.703109][T16903] _copy_to_user+0x2e/0x130 [ 845.707630][T16903] simple_read_from_buffer+0xe3/0x150 [ 845.713037][T16903] proc_fail_nth_read+0x1a6/0x220 [ 845.718087][T16903] ? proc_fault_inject_write+0x310/0x310 [ 845.723740][T16903] ? fsnotify_perm+0x254/0x560 [ 845.728520][T16903] ? proc_fault_inject_write+0x310/0x310 [ 845.734165][T16903] vfs_read+0x301/0xd60 [ 845.738525][T16903] ? kernel_read+0x1e0/0x1e0 [ 845.743146][T16903] ? __fget_files+0x40f/0x480 [ 845.747843][T16903] ? mutex_lock_nested+0x17/0x20 [ 845.752838][T16903] ? __fdget_pos+0x2bf/0x370 [ 845.757451][T16903] ? ksys_read+0x71/0x260 [ 845.761881][T16903] ksys_read+0x152/0x260 [ 845.766255][T16903] ? vfs_write+0xd60/0xd60 [ 845.770695][T16903] ? syscall_enter_from_user_mode+0x2a/0x70 [ 845.776606][T16903] do_syscall_64+0x4c/0xa0 [ 845.781036][T16903] ? clear_bhb_loop+0x30/0x80 [ 845.785729][T16903] ? clear_bhb_loop+0x30/0x80 [ 845.790428][T16903] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 845.796335][T16903] RIP: 0033:0x7f9b1c3c404e [ 845.800939][T16903] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 845.820655][T16903] RSP: 002b:00007f9b1a65cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 845.829086][T16903] RAX: ffffffffffffffda RBX: 00007f9b1a65d6c0 RCX: 00007f9b1c3c404e [ 845.837070][T16903] RDX: 000000000000000f RSI: 00007f9b1a65d0a0 RDI: 000000000000000a [ 845.845051][T16903] RBP: 00007f9b1a65d090 R08: 0000000000000000 R09: 0000000000000000 [ 845.853034][T16903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 845.861099][T16903] R13: 00007f9b1c67d038 R14: 00007f9b1c67cfa0 R15: 00007ffe5cde8518 [ 845.869109][T16903] [ 846.985302][T16161] Bluetooth: hci4: command 0x0406 tx timeout [ 847.672302][T16936] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.3666'. [ 847.749932][T16936] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 848.454636][ C1] net_ratelimit: 3917 callbacks suppressed [ 848.454658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:05:7b:af:a7:85, vlan:0) [ 848.473623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 848.486370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 848.495343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 848.498854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 848.511594][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 848.522869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.535080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 848.547480][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.559853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 852.264302][T17008] netlink: 'syz.5.3684': attribute type 1 has an invalid length. [ 852.313783][T17008] netlink: 144 bytes leftover after parsing attributes in process `syz.5.3684'. [ 852.403730][T17008] netlink: 'syz.5.3684': attribute type 1 has an invalid length. [ 852.504902][T17008] netlink: 181400 bytes leftover after parsing attributes in process `syz.5.3684'. [ 852.665473][T17009] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.3683'. [ 852.730629][T17009] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 852.798154][T17009] CPU: 1 PID: 17009 Comm: syz.1.3683 Not tainted syzkaller #0 [ 852.805674][T17009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 852.815843][T17009] Call Trace: [ 852.819159][T17009] [ 852.822194][T17009] dump_stack_lvl+0x188/0x250 [ 852.826903][T17009] ? show_regs_print_info+0x20/0x20 [ 852.832138][T17009] ? load_image+0x400/0x400 [ 852.836710][T17009] sysfs_warn_dup+0x8a/0xa0 [ 852.841244][T17009] sysfs_do_create_link_sd+0xc0/0x110 [ 852.846640][T17009] device_add+0x7ed/0xfb0 [ 852.851100][T17009] wiphy_register+0x1e81/0x2c30 [ 852.855997][T17009] ? cfg80211_event_work+0x40/0x40 [ 852.861232][T17009] ? minstrel_ht_alloc+0x808/0x980 [ 852.866376][T17009] ? ieee80211_init_rate_ctrl_alg+0x55e/0x5e0 [ 852.872478][T17009] ieee80211_register_hw+0x2aa1/0x3af0 [ 852.877985][T17009] ? ieee80211_tasklet_handler+0x20/0x20 [ 852.883653][T17009] ? rcu_is_watching+0x11/0xa0 [ 852.888533][T17009] ? memset+0x1e/0x40 [ 852.892543][T17009] ? hrtimer_init+0x10c/0x220 [ 852.897251][T17009] mac80211_hwsim_new_radio+0x20d3/0x4080 [ 852.903139][T17009] hwsim_new_radio_nl+0xa6f/0xc40 [ 852.908295][T17009] genl_rcv_msg+0xcea/0xf90 [ 852.912836][T17009] ? genl_bind+0x380/0x380 [ 852.917392][T17009] ? __dev_queue_xmit+0x1cbf/0x2f80 [ 852.922804][T17009] ? verify_lock_unused+0x140/0x140 [ 852.928058][T17009] ? perf_trace_lock+0xe4/0x390 [ 852.933050][T17009] ? hwsim_tx_info_frame_received_nl+0x1020/0x1020 [ 852.939597][T17009] netlink_rcv_skb+0x1f5/0x440 [ 852.944467][T17009] ? genl_bind+0x380/0x380 [ 852.948916][T17009] ? netlink_ack+0xb50/0xb50 [ 852.953542][T17009] ? __lock_acquire+0x7d10/0x7d10 [ 852.958602][T17009] ? down_read+0x1aa/0x2e0 [ 852.963051][T17009] genl_rcv+0x24/0x40 [ 852.967150][T17009] netlink_unicast+0x774/0x920 [ 852.972119][T17009] netlink_sendmsg+0x8ba/0xbe0 [ 852.976918][T17009] ? netlink_getsockopt+0x570/0x570 [ 852.982241][T17009] ? aa_sock_msg_perm+0x94/0x150 [ 852.987200][T17009] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 852.992505][T17009] ? security_socket_sendmsg+0x7c/0xa0 [ 852.997987][T17009] ? netlink_getsockopt+0x570/0x570 [ 853.003209][T17009] ____sys_sendmsg+0x5b7/0x8f0 [ 853.008097][T17009] ? __sys_sendmsg_sock+0x30/0x30 [ 853.013250][T17009] ? import_iovec+0x6f/0xa0 [ 853.017890][T17009] ___sys_sendmsg+0x236/0x2e0 [ 853.022687][T17009] ? __sys_sendmsg+0x2a0/0x2a0 [ 853.027491][T17009] ? trace_event_raw_event_lock+0x270/0x270 [ 853.033439][T17009] __se_sys_sendmsg+0x1af/0x290 [ 853.038319][T17009] ? __x64_sys_sendmsg+0x80/0x80 [ 853.043270][T17009] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 853.049289][T17009] ? lockdep_hardirqs_on+0x94/0x140 [ 853.054615][T17009] do_syscall_64+0x4c/0xa0 [ 853.059234][T17009] ? clear_bhb_loop+0x30/0x80 [ 853.063930][T17009] ? clear_bhb_loop+0x30/0x80 [ 853.068730][T17009] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 853.074819][T17009] RIP: 0033:0x7f97b0404819 [ 853.079369][T17009] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 853.099079][T17009] RSP: 002b:00007f97ae61c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 853.107526][T17009] RAX: ffffffffffffffda RBX: 00007f97b067e180 RCX: 00007f97b0404819 [ 853.115513][T17009] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000d [ 853.123504][T17009] RBP: 00007f97b049ac91 R08: 0000000000000000 R09: 0000000000000000 [ 853.131751][T17009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 853.139734][T17009] R13: 00007f97b067e218 R14: 00007f97b067e180 R15: 00007ffe7f438cd8 [ 853.147739][T17009] [ 853.466577][ C0] net_ratelimit: 4579 callbacks suppressed [ 853.466602][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.485194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.485420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.497708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.511608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.522379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.534912][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.546771][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.560656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.570748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 853.692676][T17012] netlink: 212412 bytes leftover after parsing attributes in process `syz.6.3686'. [ 857.627323][T17067] netlink: 212412 bytes leftover after parsing attributes in process `syz.4.3699'. [ 858.102456][T17076] netlink: 'syz.4.3702': attribute type 1 has an invalid length. [ 858.120409][T17076] netlink: 144 bytes leftover after parsing attributes in process `syz.4.3702'. [ 858.354844][T17076] netlink: 'syz.4.3702': attribute type 1 has an invalid length. [ 858.439456][T17076] netlink: 181400 bytes leftover after parsing attributes in process `syz.4.3702'. [ 858.475446][ C0] net_ratelimit: 6424 callbacks suppressed [ 858.475466][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.484841][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.493685][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.505429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.518750][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.529586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.541656][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.553602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.566846][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.577819][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 858.635169][T17084] netlink: 203516 bytes leftover after parsing attributes in process `syz.3.3704'. [ 859.821503][T17094] device syzkaller0 entered promiscuous mode [ 861.811322][T17131] netlink: 84532 bytes leftover after parsing attributes in process `syz.5.3716'. [ 861.997644][T17128] netlink: 212412 bytes leftover after parsing attributes in process `syz.3.3717'. [ 862.014066][T17131] netlink: 'syz.5.3716': attribute type 28 has an invalid length. [ 862.094089][T17131] netlink: 2 bytes leftover after parsing attributes in process `syz.5.3716'. [ 862.350166][T17135] netlink: 'syz.6.3718': attribute type 1 has an invalid length. [ 862.914516][T17135] netlink: 144 bytes leftover after parsing attributes in process `syz.6.3718'. [ 862.928038][T17135] netlink: 'syz.6.3718': attribute type 1 has an invalid length. [ 863.322403][T17135] netlink: 181400 bytes leftover after parsing attributes in process `syz.6.3718'. [ 863.484645][ C1] net_ratelimit: 6264 callbacks suppressed [ 863.484665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.494181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.502866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.516361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.527182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.539144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.551016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.564047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.574931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 863.586861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 864.117286][T17154] netlink: 'syz.1.3724': attribute type 21 has an invalid length. [ 864.156774][T17156] netlink: 203516 bytes leftover after parsing attributes in process `syz.6.3723'. [ 867.127117][T17190] netlink: 212412 bytes leftover after parsing attributes in process `syz.5.3731'. [ 867.269131][T17202] netlink: 84532 bytes leftover after parsing attributes in process `syz.1.3734'. [ 867.479541][T17202] netlink: 'syz.1.3734': attribute type 28 has an invalid length. [ 867.528183][T17202] netlink: 2 bytes leftover after parsing attributes in process `syz.1.3734'. [ 867.978235][T17217] netlink: 'syz.1.3735': attribute type 1 has an invalid length. [ 868.081107][T17217] netlink: 144 bytes leftover after parsing attributes in process `syz.1.3735'. [ 868.137582][T17215] netlink: 'syz.3.3738': attribute type 21 has an invalid length. [ 868.270716][T17211] netlink: 'syz.1.3735': attribute type 1 has an invalid length. [ 868.357603][T17211] netlink: 181400 bytes leftover after parsing attributes in process `syz.1.3735'. [ 868.502809][ C0] net_ratelimit: 6164 callbacks suppressed [ 868.502828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.513918][T17226] FAULT_INJECTION: forcing a failure. [ 868.513918][T17226] name failslab, interval 1, probability 0, space 0, times 0 [ 868.521312][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.535228][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.546942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.557732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.569670][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.581668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 868.594748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.605664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.617653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 868.724513][T17226] CPU: 0 PID: 17226 Comm: syz.6.3741 Not tainted syzkaller #0 [ 868.732136][T17226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 868.742309][T17226] Call Trace: [ 868.745723][T17226] [ 868.748663][T17226] dump_stack_lvl+0x188/0x250 [ 868.753359][T17226] ? show_regs_print_info+0x20/0x20 [ 868.758576][T17226] ? load_image+0x400/0x400 [ 868.763092][T17226] ? perf_trace_lock_acquire+0xed/0x3e0 [ 868.768660][T17226] should_fail+0x38c/0x4c0 [ 868.773095][T17226] should_failslab+0x5/0x20 [ 868.777602][T17226] slab_pre_alloc_hook+0x51/0xc0 [ 868.782544][T17226] ? skb_clone+0x1bd/0x350 [ 868.786964][T17226] kmem_cache_alloc+0x3d/0x290 [ 868.791829][T17226] skb_clone+0x1bd/0x350 [ 868.796084][T17226] __netlink_deliver_tap+0x3cd/0x7c0 [ 868.801395][T17226] netlink_deliver_tap+0x16c/0x180 [ 868.806510][T17226] netlink_dump+0x823/0xcf0 [ 868.811036][T17226] ? netlink_lookup+0x1d0/0x1d0 [ 868.815902][T17226] netlink_recvmsg+0x672/0xe20 [ 868.820692][T17226] ? netlink_sendmsg+0xbe0/0xbe0 [ 868.825826][T17226] ? aa_sk_perm+0x7dc/0x910 [ 868.830337][T17226] ? aa_af_perm+0x340/0x340 [ 868.834855][T17226] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 868.840141][T17226] ? security_socket_recvmsg+0x85/0xb0 [ 868.845601][T17226] ? netlink_sendmsg+0xbe0/0xbe0 [ 868.850568][T17226] ____sys_recvmsg+0x2cd/0x5e0 [ 868.855347][T17226] ? __sys_recvmsg_sock+0x40/0x40 [ 868.860388][T17226] ? import_iovec+0x6f/0xa0 [ 868.864897][T17226] ___sys_recvmsg+0x21a/0x5c0 [ 868.869584][T17226] ? __sys_recvmsg+0x280/0x280 [ 868.874528][T17226] ? __lock_acquire+0x7d10/0x7d10 [ 868.879584][T17226] __x64_sys_recvmsg+0x1f9/0x2c0 [ 868.884531][T17226] ? ___sys_recvmsg+0x5c0/0x5c0 [ 868.889383][T17226] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 868.895378][T17226] ? lockdep_hardirqs_on+0x94/0x140 [ 868.900588][T17226] do_syscall_64+0x4c/0xa0 [ 868.905008][T17226] ? clear_bhb_loop+0x30/0x80 [ 868.909779][T17226] ? clear_bhb_loop+0x30/0x80 [ 868.914456][T17226] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 868.920351][T17226] RIP: 0033:0x7f51fc6b5819 [ 868.924856][T17226] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 868.944726][T17226] RSP: 002b:00007f51fa90f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 868.953145][T17226] RAX: ffffffffffffffda RBX: 00007f51fc92efa0 RCX: 00007f51fc6b5819 [ 868.961119][T17226] RDX: 0000000000000040 RSI: 0000200000000900 RDI: 0000000000000003 [ 868.969091][T17226] RBP: 00007f51fa90f090 R08: 0000000000000000 R09: 0000000000000000 [ 868.977061][T17226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.985036][T17226] R13: 00007f51fc92f038 R14: 00007f51fc92efa0 R15: 00007ffed5cecfa8 [ 868.993032][T17226] [ 870.183171][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.189676][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 872.138920][T17248] netlink: 212412 bytes leftover after parsing attributes in process `syz.1.3747'. [ 872.867755][T17250] netlink: 'syz.6.3757': attribute type 21 has an invalid length. [ 873.261981][T17257] netlink: 84532 bytes leftover after parsing attributes in process `syz.4.3749'. [ 873.513389][ C0] net_ratelimit: 3505 callbacks suppressed [ 873.513690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 873.522025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 873.546372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 873.558700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 873.571134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 873.583420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 873.595674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 873.607980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 873.620241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 873.632488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 874.234546][T17260] netlink: 'syz.4.3749': attribute type 28 has an invalid length. [ 874.259161][T17260] netlink: 2 bytes leftover after parsing attributes in process `syz.4.3749'. [ 874.648777][T17266] netlink: 203516 bytes leftover after parsing attributes in process `syz.1.3752'. [ 877.409115][T17295] netlink: 'syz.1.3760': attribute type 3 has an invalid length. [ 877.446272][T17295] netlink: 132 bytes leftover after parsing attributes in process `syz.1.3760'. [ 877.651316][T17300] netlink: 212412 bytes leftover after parsing attributes in process `syz.1.3763'. [ 877.935106][T17313] netlink: 144 bytes leftover after parsing attributes in process `syz.3.3764'. [ 878.514534][ C1] net_ratelimit: 5089 callbacks suppressed [ 878.514555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 878.532841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 878.534015][T17323] netlink: 'syz.4.3768': attribute type 21 has an invalid length. [ 878.545214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 878.554002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 878.565095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 878.577158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 878.589136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 878.600996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 878.613029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 878.625099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 879.667335][T17356] netlink: 212412 bytes leftover after parsing attributes in process `syz.1.3776'. [ 879.912727][T17364] FAULT_INJECTION: forcing a failure. [ 879.912727][T17364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 879.932916][T17364] CPU: 0 PID: 17364 Comm: syz.3.3779 Not tainted syzkaller #0 [ 879.940432][T17364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 879.950732][T17364] Call Trace: [ 879.954033][T17364] [ 879.956980][T17364] dump_stack_lvl+0x188/0x250 [ 879.961676][T17364] ? show_regs_print_info+0x20/0x20 [ 879.966896][T17364] ? load_image+0x400/0x400 [ 879.971525][T17364] ? __lock_acquire+0x7d10/0x7d10 [ 879.976691][T17364] should_fail+0x38c/0x4c0 [ 879.981243][T17364] _copy_to_user+0x2e/0x130 [ 879.985935][T17364] simple_read_from_buffer+0xe3/0x150 [ 879.991332][T17364] proc_fail_nth_read+0x1a6/0x220 [ 879.996381][T17364] ? proc_fault_inject_write+0x310/0x310 [ 880.002029][T17364] ? fsnotify_perm+0x254/0x560 [ 880.006811][T17364] ? proc_fault_inject_write+0x310/0x310 [ 880.012462][T17364] vfs_read+0x301/0xd60 [ 880.016781][T17364] ? kernel_read+0x1e0/0x1e0 [ 880.021398][T17364] ? __fget_files+0x40f/0x480 [ 880.026097][T17364] ? mutex_lock_nested+0x17/0x20 [ 880.031052][T17364] ? __fdget_pos+0x2bf/0x370 [ 880.035694][T17364] ? ksys_read+0x71/0x260 [ 880.040050][T17364] ksys_read+0x152/0x260 [ 880.044319][T17364] ? vfs_write+0xd60/0xd60 [ 880.048752][T17364] ? lockdep_hardirqs_on+0x94/0x140 [ 880.053963][T17364] do_syscall_64+0x4c/0xa0 [ 880.058390][T17364] ? clear_bhb_loop+0x30/0x80 [ 880.063082][T17364] ? clear_bhb_loop+0x30/0x80 [ 880.067769][T17364] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 880.073671][T17364] RIP: 0033:0x7f0db70e904e [ 880.078099][T17364] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 880.097717][T17364] RSP: 002b:00007f0db5360fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 880.106157][T17364] RAX: ffffffffffffffda RBX: 00007f0db53616c0 RCX: 00007f0db70e904e [ 880.114140][T17364] RDX: 000000000000000f RSI: 00007f0db53610a0 RDI: 0000000000000006 [ 880.122120][T17364] RBP: 00007f0db5361090 R08: 0000000000000000 R09: 0000000000000000 [ 880.130098][T17364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 880.138078][T17364] R13: 00007f0db73a2128 R14: 00007f0db73a2090 R15: 00007ffce55c5048 [ 880.146076][T17364] [ 880.160341][T17366] netlink: 'syz.5.3778': attribute type 29 has an invalid length. [ 880.263168][T17366] netlink: 'syz.5.3778': attribute type 29 has an invalid length. [ 881.055956][T17383] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 883.524583][ C1] net_ratelimit: 7590 callbacks suppressed [ 883.524606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 883.542880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 883.555273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 883.567609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 883.579895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 883.581766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 883.592210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 883.604097][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 883.616001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 883.628040][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 884.012805][T17402] netlink: 212412 bytes leftover after parsing attributes in process `syz.4.3790'. [ 885.714874][T17429] FAULT_INJECTION: forcing a failure. [ 885.714874][T17429] name failslab, interval 1, probability 0, space 0, times 0 [ 886.000911][T17429] CPU: 0 PID: 17429 Comm: syz.5.3796 Not tainted syzkaller #0 [ 886.008428][T17429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 886.018852][T17429] Call Trace: [ 886.022160][T17429] [ 886.025191][T17429] dump_stack_lvl+0x188/0x250 [ 886.030006][T17429] ? show_regs_print_info+0x20/0x20 [ 886.035352][T17429] ? load_image+0x400/0x400 [ 886.039884][T17429] ? memset+0x1e/0x40 [ 886.043886][T17429] should_fail+0x38c/0x4c0 [ 886.048327][T17429] should_failslab+0x5/0x20 [ 886.052851][T17429] slab_pre_alloc_hook+0x51/0xc0 [ 886.057812][T17429] ? __build_skb+0x26/0x2e0 [ 886.062334][T17429] kmem_cache_alloc+0x3d/0x290 [ 886.067126][T17429] __build_skb+0x26/0x2e0 [ 886.071525][T17429] build_skb+0x1e/0x170 [ 886.075712][T17429] bpf_prog_test_run_skb+0x260/0x1180 [ 886.081126][T17429] ? __fget_files+0x40f/0x480 [ 886.085927][T17429] ? cpu_online+0x60/0x60 [ 886.090287][T17429] bpf_prog_test_run+0x31e/0x390 [ 886.095250][T17429] __sys_bpf+0x5a5/0x6f0 [ 886.099516][T17429] ? perf_trace_preemptirq_template+0x2aa/0x360 [ 886.105783][T17429] ? bpf_link_show_fdinfo+0x380/0x380 [ 886.111543][T17429] ? rcu_nmi_exit+0x6f/0xf0 [ 886.116155][T17429] ? vtime_user_exit+0x2c8/0x3e0 [ 886.121126][T17429] __x64_sys_bpf+0x78/0x90 [ 886.125581][T17429] do_syscall_64+0x4c/0xa0 [ 886.130022][T17429] ? clear_bhb_loop+0x30/0x80 [ 886.134726][T17429] ? clear_bhb_loop+0x30/0x80 [ 886.139562][T17429] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 886.145503][T17429] RIP: 0033:0x7f6da65fc819 [ 886.150257][T17429] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 886.170209][T17429] RSP: 002b:00007f6da4835028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 886.178669][T17429] RAX: ffffffffffffffda RBX: 00007f6da6876090 RCX: 00007f6da65fc819 [ 886.186685][T17429] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 886.194689][T17429] RBP: 00007f6da4835090 R08: 0000000000000000 R09: 0000000000000000 [ 886.202692][T17429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.210691][T17429] R13: 00007f6da6876128 R14: 00007f6da6876090 R15: 00007ffd41b2b668 [ 886.218714][T17429] [ 888.211246][T17437] netlink: 'syz.3.3800': attribute type 10 has an invalid length. [ 888.278191][T17437] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3800'. [ 888.534509][ C1] net_ratelimit: 10278 callbacks suppressed [ 888.534531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.546763][T17437] batman_adv: batadv0: Adding interface: veth1_vlan [ 888.553029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 888.571578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 888.575117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.583877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.597080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.619860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.627324][T17437] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.632402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.670258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.684096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 888.734982][T17437] batman_adv: batadv0: Interface activated: veth1_vlan [ 891.426600][T17454] netlink: 'syz.6.3814': attribute type 10 has an invalid length. [ 891.522358][T17454] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3814'. [ 891.662205][T17454] batman_adv: batadv0: Adding interface: veth1_vlan [ 891.728646][T17454] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 891.909175][T17454] batman_adv: batadv0: Interface activated: veth1_vlan [ 892.534287][T17464] netlink: 'syz.4.3806': attribute type 21 has an invalid length. [ 892.975379][T17487] netlink: 'syz.4.3822': attribute type 10 has an invalid length. [ 893.001901][T17487] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3822'. [ 893.068041][T17487] batman_adv: batadv0: Adding interface: veth1_vlan [ 893.098134][T17487] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 893.330946][T17487] batman_adv: batadv0: Interface activated: veth1_vlan [ 893.578751][ C0] net_ratelimit: 11301 callbacks suppressed [ 893.578774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.597359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.604755][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 893.609831][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.621670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 893.635350][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.645639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.657692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 893.669611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 893.681516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.643937][ C0] net_ratelimit: 1439 callbacks suppressed [ 898.643960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.645066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 898.650312][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.650592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.650987][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.652714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.671405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 898.676928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.677218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 898.677595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 899.816155][T17554] netlink: 'syz.3.3826': attribute type 21 has an invalid length. [ 900.874011][T17568] netlink: 'syz.1.3830': attribute type 10 has an invalid length. [ 901.187417][T17568] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3830'. [ 901.199664][T17568] batman_adv: batadv0: Adding interface: veth1_vlan [ 901.223111][T17568] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 901.323272][T17568] batman_adv: batadv0: Interface activated: veth1_vlan [ 902.470516][T17602] syz.4.3842[17602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.470649][T17602] syz.4.3842[17602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.792437][T17607] netlink: 'syz.6.3841': attribute type 21 has an invalid length. [ 903.644607][ C1] net_ratelimit: 7538 callbacks suppressed [ 903.644628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 903.662791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 903.675171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 903.676511][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 903.687547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 903.687814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 903.719155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 903.723948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 903.748194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 903.751662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 904.106900][T17615] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 905.127634][T17631] netlink: 'syz.3.3848': attribute type 28 has an invalid length. [ 905.196448][T17631] netlink: 'syz.3.3848': attribute type 4 has an invalid length. [ 905.204238][T17631] netlink: 136 bytes leftover after parsing attributes in process `syz.3.3848'. [ 907.302122][T17671] TCP: TCP_TX_DELAY enabled [ 908.664478][ C1] net_ratelimit: 6591 callbacks suppressed [ 908.664709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.683998][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.691250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 908.697796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.698059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.698428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.700127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.714880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 908.723747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 908.724009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 911.581571][T17716] netlink: 'syz.1.3869': attribute type 10 has an invalid length. [ 911.709474][T17716] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3869'. [ 911.834958][T17716] device vlan1 entered promiscuous mode [ 911.960482][T17716] batman_adv: batadv0: Adding interface: vlan1 [ 912.009300][T17716] batman_adv: batadv0: The MTU of interface vlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 912.079780][T17716] batman_adv: batadv0: Interface activated: vlan1 [ 913.701250][ C1] net_ratelimit: 4359 callbacks suppressed [ 913.701292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 913.709543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 913.727175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 913.784645][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 913.828235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 913.874419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 913.874423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 913.884725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 913.896441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 913.909752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.704463][ C1] net_ratelimit: 5685 callbacks suppressed [ 918.704483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.710477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.722663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.722996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 918.723249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 918.723578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.771162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.771887][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.791663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 918.835019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 920.739555][T17772] netlink: 'syz.4.3884': attribute type 10 has an invalid length. [ 920.827036][T17772] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3884'. [ 920.886291][T17772] device vlan1 entered promiscuous mode [ 921.087036][T17772] batman_adv: batadv0: Adding interface: vlan1 [ 921.094273][T17772] batman_adv: batadv0: The MTU of interface vlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 923.769542][ C0] net_ratelimit: 2251 callbacks suppressed [ 923.769591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 923.774968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 923.932302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.063298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 924.126610][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.131988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 924.138997][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.139267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.139614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.158636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 924.317210][T17772] batman_adv: batadv0: Interface activated: vlan1 [ 924.897941][T17797] netlink: 44 bytes leftover after parsing attributes in process `syz.5.3892'. [ 928.781054][ C1] net_ratelimit: 4028 callbacks suppressed [ 928.781095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.815937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.816332][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.828284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.828503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.844817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.852674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.868388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 928.877853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 928.892602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 929.628123][T17841] netlink: 'syz.6.3903': attribute type 10 has an invalid length. [ 929.669371][T17841] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3903'. [ 929.720925][T17841] device vlan1 entered promiscuous mode [ 929.770841][T17841] batman_adv: batadv0: Adding interface: vlan1 [ 929.915685][T17841] batman_adv: batadv0: The MTU of interface vlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 930.079519][T17841] batman_adv: batadv0: Interface activated: vlan1 [ 930.441758][ T4210] unregister_netdevice: waiting for lo to become free. Usage count = 2 [ 931.562987][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.569362][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 933.785393][ C1] net_ratelimit: 16112 callbacks suppressed [ 933.785416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 933.785541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.791589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 933.803675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.815553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.827572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.839749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.853103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.864140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 933.877043][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.794501][ C0] net_ratelimit: 21955 callbacks suppressed [ 938.794523][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.794608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.800776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.812706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.825673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.836648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:62:d7:91:cb:af, vlan:0) [ 938.848650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.860640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 938.872648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0) [ 938.884673][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:ff:ff, vlan:0)